Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-24328OS Command Injection in A3300r Firmware

Severity
9.8CRITICALNVD
EPSS
84.4%
top 0.67%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 30

Description

TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setMacFilterRules function.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDtotolink/a3300r_firmware17.0.0cu.557_b20221024

🔴Vulnerability Details

3
GHSA
GHSA-4q7q-5p3p-5fcj: TOTOLINK A3300R V172024-01-30
CVEList
CVE-2024-24328: TOTOLINK A3300R V172024-01-30
VulnCheck
totolink a3300r_firmware Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')2024

💥Exploits & PoCs

1
Nuclei
TotoLink Router setMacFilterRules - Command Injection
CVE-2024-24328 — OS Command Injection | cvebase