cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-0942,https://securityvulnerability.io/vulnerability/CVE-2024-0942,Totolink N200RE V5 cstecgi.cgi session expiration,A vulnerability was found in Totolink N200RE V5 9.3.5u.6255_B20211224. It has been classified as problematic. Affected is an unknown function of the file /cgi-bin/cstecgi.cgi. The manipulation leads to session expiration. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-252186 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.,Totolink,N200RE V5,4.3,MEDIUM,0.001509999972768128,false,,false,false,true,2024-01-26T20:15:00.000Z,true,false,false,,2024-01-26T20:15:00.000Z,0 CVE-2022-46025,https://securityvulnerability.io/vulnerability/CVE-2022-46025,Incorrect Access Control in Totolink Product,"The Totolink N200RE_V5, specifically version V9.3.5u.6255_B20211224, is exposed to an Incorrect Access Control vulnerability. This flaw enables remote attackers to exploit the system, granting unauthorized access to sensitive Wi-Fi system information, including the Wi-Fi SSID and password. Such vulnerabilities pose significant risks, allowing malicious entities to infiltrate networks and potentially compromise user data and privacy. It is crucial for users and network administrators to implement security measures to protect against these unauthorized access risks.",Totolink,N200re V5 Firmware,9.1,CRITICAL,0.0012700000079348683,false,,false,false,false,,,false,false,,2024-01-10T00:00:00.000Z,0 CVE-2023-4746,https://securityvulnerability.io/vulnerability/CVE-2023-4746,TOTOLINK N200RE V5 Validity_check format string,"A security vulnerability has been identified in the TOTOLINK N200RE V5 router, specifically in the Validity_check function. This flaw allows attackers to manipulate format strings, which can lead to OS command injection when they bypass the necessary validation. Remote attackers can exploit this vulnerability, making it critical to patch and secure affected devices promptly. This exploit has been publicly disclosed, raising concerns over potential attacks.",TOTOLINK,N200RE V5,8.8,HIGH,0.0026599999982863665,false,,false,false,false,,,false,false,,2023-09-04T01:15:00.000Z,0 CVE-2022-48113,https://securityvulnerability.io/vulnerability/CVE-2022-48113,Remote Access Vulnerability in TOTOLINK N200RE_v5 Firmware,"A vulnerability in the TOTOLINK N200RE_v5 firmware allows unauthenticated attackers to exploit the telnet service through a specially crafted POST request. This flaw enables attackers to gain unauthorized access and potentially log in as the root user, utilizing hardcoded credentials. The implications of this vulnerability may lead to critical unauthorized control over network devices.",Totolink,N200re-v5 Firmware,9.8,CRITICAL,0.02607000060379505,false,,false,false,false,,,false,false,,2023-02-02T00:00:00.000Z,0