A command injection vulnerability in the ip parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
References
Link | Resource |
---|---|
https://github.com/Double-q1015/CVE-vulns/blob/main/totolink_t8/recvSlaveCloudCheckStatus_ip/recvSlaveCloudCheckStatus_ip.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-02-03 16:15
Updated : 2023-02-10 02:09
NVD link : CVE-2023-24151
Mitre link : CVE-2023-24151
CVE.ORG link : CVE-2023-24151
JSON object : View
Products Affected
totolink
- t8_firmware
- t8
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')