Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ CVE-2022-40220 | Siretta QUARTZ-GOLD G5.0.1.5-210720-141020 HTTP Request txt/restore.cgi os command injection (TALOS-2022-1612)

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š CVE-2022-40220 | Siretta QUARTZ-GOLD G5.0.1.5-210720-141020 HTTP Request txt/restore.cgi os command injection (TALOS-2022-1612)


๐Ÿ’ก Newskategorie: Sicherheitslรผcken
๐Ÿ”— Quelle: vuldb.com

A vulnerability was found in Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. It has been classified as critical. This affects an unknown part of the file txt/restore.cgi of the component HTTP Request Handler. The manipulation leads to os command injection. This vulnerability is uniquely identified as CVE-2022-40220. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to apply a patch to fix this issue. ...



๐Ÿ“Œ CVE-2023-27380 | Peplink Surf SOHO HW1 6.3.5 HTTP Request admin.cgi USSD_send os command injection (TALOS-2023-1780)


๐Ÿ“ˆ 41.83 Punkte

๐Ÿ“Œ CVE-2023-35193 | Peplink Surf SOHO HW1 6.3.5 HTTP Request api.cgi os command injection (TALOS-2023-1782)


๐Ÿ“ˆ 41.83 Punkte

๐Ÿ“Œ CVE-2023-34356 | Peplink Surf SOHO HW1 6.3.5 HTTP Request data.cgi xfer_dns os command injection (TALOS-2023-1778)


๐Ÿ“ˆ 41.83 Punkte

๐Ÿ“Œ CVE-2023-28381 | Peplink Surf SOHO HW1 6.3.5 HTTP Request admin.cgi MVPN_trial_init os command injection (TALOS-2023-1779)


๐Ÿ“ˆ 41.83 Punkte

๐Ÿ“Œ PLANEX CS-W50HD up to 30719 Web Management UI /cgi-bin/nasset.cgi HTTP POST Request command injection


๐Ÿ“ˆ 36.2 Punkte

๐Ÿ“Œ CVE-2024-0299 | Totolink N200RE 9.3.5u.6139_B20201216 /cgi-bin/cstecgi.cgi setTracerouteCfg command os command injection


๐Ÿ“ˆ 35.35 Punkte

๐Ÿ“Œ CVE-2023-34354 | Peplink Surf SOHO HW1 6.3.5 HTTP Request upload_brand.cgi cross site scripting (TALOS-2023-1781)


๐Ÿ“ˆ 32.41 Punkte

๐Ÿ“Œ CVE-2023-6901 | codelyfe Stupid Simple CMS up to 1.2.3 HTTP POST Request handle-command.php command os command injection


๐Ÿ“ˆ 30.09 Punkte

๐Ÿ“Œ CVE-2015-5082 | Endian Firewall up to 2.x cgi-bin/chpasswd.cgi NEW_PASSWORD_1/NEW_PASSWORD_2 command injection (ID 133469 / EDB-37426)


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2023-45852 | Viessmann Vitogate 300 2.1.3.0 /cgi-bin/vitogate.cgi ipaddr os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2023-50651 | Totolink X6000R 9.4.0cu.852_B20230719 /cgi-bin/cstecgi.cgi os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2023-6612 | Totolink X5000R 9.1.0cu.2300_B20230112 /cgi-bin/cstecgi.cgi os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0294 | Totolink LR1200GB 9.1.0u.6619_B20230130 /cgi-bin/cstecgi.cgi setUssd ussd os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0293 | Totolink LR1200GB 9.1.0u.6619_B20230130 /cgi-bin/cstecgi.cgi setUploadSetting FileName os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0292 | Totolink LR1200GB 9.1.0u.6619_B20230130 /cgi-bin/cstecgi.cgi setOpModeCfg hostName os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0291 | Totolink LR1200GB 9.1.0u.6619_B20230130 /cgi-bin/cstecgi.cgi UploadFirmwareFile FileName command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0298 | Totolink N200RE 9.3.5u.6139_B20201216 /cgi-bin/cstecgi.cgi setDiagnosisCfg ip os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0297 | Totolink N200RE 9.3.5u.6139_B20201216 /cgi-bin/cstecgi.cgi UploadFirmwareFile FileName os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0296 | Totolink N200RE 9.3.5u.6139_B20201216 /cgi-bin/cstecgi.cgi NTPSyncWithHost host_time os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ CVE-2024-0295 | Totolink LR1200GB 9.1.0u.6619_B20230130 /cgi-bin/cstecgi.cgi setWanCfg hostName os command injection


๐Ÿ“ˆ 29.58 Punkte

๐Ÿ“Œ Zivif PR115-204-P-RS 2.3.4.2103 cgi-bin/iptest.cgi url command injection


๐Ÿ“ˆ 28.32 Punkte

๐Ÿ“Œ ThinStation up to 6.1.1 cgi-bin/CdControl.cgi action command injection


๐Ÿ“ˆ 28.32 Punkte

๐Ÿ“Œ D-Link DNS-320 up to 2.05.B10 CGI Script login_mgr.cgi command injection


๐Ÿ“ˆ 28.32 Punkte

๐Ÿ“Œ WAVLINK WN530H4 M30H4.V5030.190403 /cgi-bin/live_api.cgi command injection


๐Ÿ“ˆ 28.32 Punkte

๐Ÿ“Œ CVE-2023-3991 | FreshTomato 2023.3 HTTP Request iperfrun.cgi os command injection


๐Ÿ“ˆ 28.01 Punkte

๐Ÿ“Œ CVE-2021-39510 | D-Link DIR-816 HTTP Request Parameter form2userconfig.cgi command injection


๐Ÿ“ˆ 28.01 Punkte

๐Ÿ“Œ Orange Livebox 00.96.320S cgi-bin/restore.exe cross site request forgery


๐Ÿ“ˆ 27.97 Punkte

๐Ÿ“Œ Talos II Lit - a reduced cost version of our legenday Talos II mainboard with open firmware


๐Ÿ“ˆ 27.64 Punkte

๐Ÿ“Œ Crestron AM-100/AM-101 HTTP Endpoint file_transfer.cgi System Command command injection


๐Ÿ“ˆ 27.37 Punkte

๐Ÿ“Œ DrayTek Vigor3900/Vigor2960/Vigor300B up to 1.5.0 Debug Mode /cgi-bin/activate.cgi HTTP Request privilege escalation


๐Ÿ“ˆ 26.78 Punkte

๐Ÿ“Œ Sierra Wireless AirLink ES450 4.9.3 ACEManager iplogging.cgi HTTP Request command injection


๐Ÿ“ˆ 26.75 Punkte

๐Ÿ“Œ CVE-2024-0575 | Totolink LR1200GB 9.1.0u.6619_B20230130 /cgi-bin/cstecgi.cgi setTracerouteCfg command stack-based overflow


๐Ÿ“ˆ 25.93 Punkte

๐Ÿ“Œ CVE-2024-1000 | Totolink N200RE 9.3.5u.6139_B20201216 /cgi-bin/cstecgi.cgi setTracerouteCfg command stack-based overflow


๐Ÿ“ˆ 25.93 Punkte

๐Ÿ“Œ Linksys Velop 1.1.2.187020 Web Interface cgi-bin/zbtest.cgi cross site request forgery


๐Ÿ“ˆ 24.05 Punkte

๐Ÿ“Œ Aztech DSL5018EN/DSL705E/DSL705EU cgi-bin/AZ_Retrain.cgi Request denial of service


๐Ÿ“ˆ 24.05 Punkte











matomo