{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0579","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-16T07:06:36.691Z","datePublished":"2024-01-16T16:31:03.805Z","dateUpdated":"2025-06-03T13:37:01.332Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-03T08:15:44.392Z"},"title":"Totolink X2000R formMapDelDevice command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"Totolink","product":"X2000R","versions":[{"version":"1.0.0-B20221212.1452","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in Totolink X2000R 1.0.0-B20221212.1452. Affected by this vulnerability is the function formMapDelDevice of the file /boafrm/formMapDelDevice. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In Totolink X2000R 1.0.0-B20221212.1452 wurde eine kritische Schwachstelle entdeckt. Es geht um die Funktion formMapDelDevice der Datei /boafrm/formMapDelDevice. Mittels Manipulieren des Arguments macstr mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-16T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-01-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-03T09:14:45.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jylsec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.250795","name":"VDB-250795 | Totolink X2000R formMapDelDevice command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.250795","name":"VDB-250795 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.263721","name":"Submit #263721 | TOTOLINK X2000R V1.0.0-B20221212.1452 command injection","tags":["third-party-advisory"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/X2000R/1/README.md","tags":["broken-link","exploit"]},{"url":"https://www.totolink.net/","tags":["product"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:11:35.631Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.250795","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.250795","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/X2000R/1/README.md","tags":["broken-link","exploit","x_transferred"]}]},{"affected":[{"vendor":"totolink","product":"x2000r","cpes":["cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0.0-B20221212.1452","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-03T13:36:38.070075Z","id":"CVE-2024-0579","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-03T13:37:01.332Z"}}]}}