TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the msg_process function via the Url parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
References
Link | Resource |
---|---|
https://github.com/Summermu/VulnForIoT/tree/main/Totolink_CA600-PoE/msg_process_Url/readme.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 May 2025, 19:47
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-01 17:15
Updated : 2025-05-21 19:47
NVD link : CVE-2025-44848
Mitre link : CVE-2025-44848
CVE.ORG link : CVE-2025-44848
JSON object : View
Products Affected
totolink
- ca600-poe
- ca600-poe_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')