We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability classified as problematic was found in TOTOLINK A3000RU up to 5.9c.5185. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/ExportSyslog.sh of the component Syslog Configuration File Handler. The manipulation leads to improper access controls. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
In TOTOLINK A3000RU bis 5.9c.5185 wurde eine problematische Schwachstelle entdeckt. Hierbei betrifft es unbekannten Programmcode der Datei /cgi-bin/ExportSyslog.sh der Komponente Syslog Configuration File Handler. Mit der Manipulation mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff im lokalen Netzwerk. Der Exploit steht zur öffentlichen Verfügung.
Incorrect Privilege Assignment
2025-03-23: | Advisory disclosed |
2025-03-23: | VulDB entry created |
2025-03-23: | VulDB entry last update |
wxhwxhwxh_mie (VulDB User)
vuldb.com/?id.300709 (VDB-300709 | TOTOLINK A3000RU Syslog Configuration File ExportSyslog.sh access control)
vuldb.com/?ctiid.300709 (VDB-300709 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.521570 (Submit #521570 | TOTOLINK A3000RU A3000RU_Firmware V5.9c.5185 Improper Access Controls)
lavender-bicycle-a5a.notion.site/...64970dc7809a52ac6c?pvs=4
www.totolink.net/
Support options