cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2015-9550,https://securityvulnerability.io/vulnerability/CVE-2015-9550,Remote Code Execution Vulnerability in TOTOLINK Networking Devices,"A vulnerability has been discovered in TOTOLINK A850R-V1 and F1-V2 routers, allowing for unauthorized remote access. By sending a specially crafted hel,xasf packet to the WAN interface, malicious actors can gain access to the web management interface, potentially leading to system compromise and unauthorized control over the device. This issue underscores the importance of securing router configurations and monitoring network traffic to prevent exploitations.",Totolink,A850r-v1 Firmware,7.5,HIGH,0.006279999855905771,false,,false,false,false,,,false,false,,2020-11-24T21:01:41.000Z,0 CVE-2015-9551,https://securityvulnerability.io/vulnerability/CVE-2015-9551,Remote Code Execution Vulnerability in TOTOLINK A850R and F1 Products,"A remote code execution vulnerability has been identified in select TOTOLINK router models, particularly the A850R-V1 and F1-V2 series. This issue allows an attacker to exploit the management interface through the 'formSysCmd' parameter, potentially executing arbitrary commands on the device. Versions 1.0.1-B20150707.1612 for A850R-V1 and 1.1-B20150708.1646 for F1-V2 are known to be affected. Users are advised to review their device settings and apply any available updates to mitigate this risk.",Totolink,A850r-v1 Firmware,9.8,CRITICAL,0.014220000244677067,false,,false,false,false,,,false,false,,2020-11-24T21:01:27.000Z,0