Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-7173 | 8.8 HIGH | TOTOLINK A3600R cstecgi.cgi loginauth buffer overflow |
| CVE-2024-7172 | 8.8 HIGH | TOTOLINK A3600R getSaveConfig buffer overflow |
| CVE-2024-7171 | 6.3 MEDIUM | TOTOLINK A3600R cstecgi.cgi NTPSyncWithHost os command injection |
| CVE-2024-7160 | 6.3 MEDIUM | TOTOLINK A3700R cstecgi.cgi setWanCfg command injection |
| CVE-2024-7158 | 6.3 MEDIUM | TOTOLINK A3100R HTTP POST Request cstecgi.cgi setTelnetCfg command injection |
| CVE-2024-7159 | 5.5 MEDIUM | TOTOLINK A3600R Telnet Service product.ini hard-coded password |
| CVE-2024-7156 | 5.3 MEDIUM | TOTOLINK A3700R apmib Configuration ExportSettings.sh information disclosure |
| CVE-2024-7154 | 4.3 MEDIUM | TOTOLINK A3700R Password Reset wizard.html access control |
| CVE-2024-7170 | 3.5 LOW | TOTOLINK A3000RU product.ini hard-coded password |
| CVE-2024-7155 | 2.5 LOW | TOTOLINK A3300R shadow.sample hard-coded password |
No comments yet