TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the CloudSrvUserdataVersionCheck function via the url parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
References
Link | Resource |
---|---|
https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA600-PoE/CloudSrvUserdataVersionCheck_url/readme.md | Exploit Third Party Advisory |
https://www.totolink.net | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
22 May 2025, 15:31
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 17:15
Updated : 2025-05-22 15:31
NVD link : CVE-2025-44843
Mitre link : CVE-2025-44843
CVE.ORG link : CVE-2025-44843
JSON object : View
Products Affected
totolink
- ca600-poe
- ca600-poe_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')