📦 Ex200 Firmware
by Totolink
🔍 What is Ex200 Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability involves a hardcoded root password in TOTOLINK EX200 routers, allowing attackers to gain administrative access. Anyone using affected TOTOLINK EX200 routers with the vulnerable firm...
This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK EX200 routers by sending specially crafted requests to the NTPSyncWithHost function. Attackers can take full control of...
This vulnerability allows unauthenticated attackers to download the configuration file from TOTOLINK EX200 routers via a specific CGI script. This exposes sensitive router configuration data including...
This vulnerability allows unauthenticated remote attackers to execute arbitrary commands on TOTOLINK EX200 routers by injecting malicious parameters into the downloadFlile.cgi binary. Attackers can ga...
A critical buffer overflow vulnerability in TOTOLINK EX200 routers allows remote attackers to execute arbitrary code by manipulating the http_host parameter in the getSaveConfig function. This affects...
This vulnerability in TOTOLINK EX200 routers allows attackers to access sensitive system configuration information without authentication through the getSysStatusCfg function. It affects users of TOTO...
This vulnerability allows remote attackers to execute arbitrary code on TOTOLINK EX200 routers by exploiting improper input validation in the FileName parameter during firmware upgrades. Attackers can...
The TOTOLINK EX200 V4.0.3c.7646_B20201211 wireless range extender lacks any authentication mechanism by default, allowing unauthenticated attackers to access its management interface. This affects all...
This CVE describes a command injection vulnerability in TOTOLINK EX200 routers that allows attackers to execute arbitrary system commands via the 'ussd' parameter in the setUssd function. Attackers wi...