{"api_version":"1","generated_at":"2026-04-15T06:02:52+00:00","cve":"CVE-2023-4411","urls":{"html":"https://cve.report/CVE-2023-4411","api":"https://cve.report/api/cve/CVE-2023-4411.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-4411","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-4411"},"summary":{"title":"CVE-2023-4411","description":"A vulnerability has been found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-237514 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-08-18 14:15:00","updated_at":"2023-11-07 04:22:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://vuldb.com/?ctiid.237514","name":"https://vuldb.com/?ctiid.237514","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://vuldb.com/?id.237514","name":"https://vuldb.com/?id.237514","refsource":"MISC","tags":[],"title":"CVE-2023-4411: TOTOLINK EX1200L setTracerouteCfg os command injection","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8","name":"https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8","refsource":"MISC","tags":[],"title":"Multiple OS command Injection in TOTOLink EX1200L firmware · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-4411","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-4411","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"4411","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"totolink","cpe5":"ex1200l","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"4411","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"totolink","cpe5":"ex1200l_firmware","cpe6":"9.3.5u.6146_b20201023","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-4411","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability has been found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-237514 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"deu","value":"In TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es die Funktion setTracerouteCfg. Mit der Manipulation mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"TOTOLINK","product":{"product_data":[{"product_name":"EX1200L","version":{"version_data":[{"version_affected":"=","version_value":"EN_V9.3.5u.6146_B20201023"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.237514","refsource":"MISC","name":"https://vuldb.com/?id.237514"},{"url":"https://vuldb.com/?ctiid.237514","refsource":"MISC","name":"https://vuldb.com/?ctiid.237514"},{"url":"https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8","refsource":"MISC","name":"https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8"}]},"credits":[{"lang":"en","value":"dmknght (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}]}},"nvd":{"publishedDate":"2023-08-18 14:15:00","lastModifiedDate":"2023-11-07 04:22:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}