Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 22 May 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink cp900 Totolink cp900 Firmware |
|
| CPEs | cpe:2.3:h:totolink:cp900:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:cp900_firmware:6.3c.1144_b20190715:*:*:*:*:*:*:* |
|
| Vendors & Products |
Totolink
Totolink cp900 Totolink cp900 Firmware |
Thu, 01 May 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
cvssV3_1
|
Thu, 01 May 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Totolink CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | TOTOLINK CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. |
Thu, 01 May 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Totolink CP900 V6.3c.1144_B20190715 was found to contain a command injection vulnerability in the setUpgradeUboot function via the FileName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-01T20:35:36.428Z
Reserved: 2025-04-22T00:00:00.000Z
Link: CVE-2025-44854
Updated: 2025-05-01T20:35:22.417Z
Status : Analyzed
Published: 2025-05-01T14:15:45.593
Modified: 2025-05-22T15:32:20.913
Link: CVE-2025-44854
No data.
OpenCVE Enrichment
No data.