Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
Docs
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
a3600r vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2024-7172
A vulnerability classified as critical was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. Affected by this vulnerability is the function getSaveConfig of the file /cgi-bin/cstecgi.cgi?action=save&setting. The manipulation of the argument http_host leads to buffer overflow. ...
Totolink A3600r -
Totolink A3600r
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
8.8
CVSSv3
CVE-2024-7176
A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. This issue affects the function setIpQosRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument comment leads to buffer overflow. The attack may be initiated remotely....
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
Totolink A3600r
8.8
CVSSv3
CVE-2024-7180
A vulnerability classified as critical has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. This affects the function setPortForwardRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument comment leads to buffer overflow. It is possible to initiate the attac...
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
Totolink A3600r
8.8
CVSSv3
CVE-2024-7181
A vulnerability classified as critical was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. This vulnerability affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument telnet_enabled leads to command injection. The attack can be initiat...
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
Totolink A3600r
9.8
CVSSv3
CVE-2022-25078
TOTOLink A3600R V4.1.2cu.5182_B20201102 exists to contain a command injection vulnerability in the "Main" function. This vulnerability allows malicious users to execute arbitrary commands via the QUERY_STRING parameter.
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
8.8
CVSSv3
CVE-2024-7171
A vulnerability classified as critical has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. Affected is the function NTPSyncWithHost of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostTime leads to os command injection. It is possible to launch the attack...
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
8.8
CVSSv3
CVE-2024-7173
A vulnerability, which was classified as critical, has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. Affected by this issue is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password/http_host leads to buffer overflow. The attack...
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
8.8
CVSSv3
CVE-2024-7174
A vulnerability, which was classified as critical, was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. This affects the function setdeviceName of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument deviceMac/deviceName leads to buffer overflow. It is possible to init...
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
8.8
CVSSv3
CVE-2024-7175
A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ipDoamin leads to os command injection. The attack can b...
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
8.8
CVSSv3
CVE-2024-7177
A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been classified as critical. Affected is the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument langType leads to buffer overflow. It is possible to launch the atta...
Totolink A3600r Firmware 4.1.2cu.5182 B20201102
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
ruoyi-ai
CVE-2025-6417
CVE-2025-6362
aquatronica
infosphere information server
arbitrary code
validation
IMAP
winrar
CVE-2025-6018
CVE-2025-6402
CVE-2025-6447
CVE-2025-4275
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »