CVSS 3.1 Score 9.8 of 10 (high)


Published Jan 11, 2024
Updated: Jan 18, 2024


CVE-2024-23059, also known as TOTOLINK A3300R V17.0.0cu.557_B20221024, has a command injection vulnerability in the setDdnsCfg function via the username parameter. This vulnerability affects the TOTOLINK A3300R router. The base severity of this vulnerability is rated as CRITICAL with a base score of 9.8 out of 10 by NVD@NIST.GOV. It requires no privileges and no user interaction to exploit, making it highly dangerous for organizations. The integrity and confidentiality impacts are rated as HIGH, and the availability impact is also rated as HIGH. To remediate this vulnerability, organizations should apply the latest firmware update provided by TOTOLINK to mitigate any potential risks associated with this vulnerability.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-23059 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options