Cp300 Firmware Totolink Cp300 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Totolink Cp300 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Totolink Cp300 Firmware. Cp300 Firmware did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 1 0.00
2023 2 8.65

It may take a day or so for new Cp300 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Totolink Cp300 Firmware Security Vulnerabilities

Hardcoded root password in TOTOLINK CP300 v2.0.4-b20201102 via /etc/shadow.sample
CVE-2024-36782 - June 03, 2024

TOTOLINK CP300 V2.0.4-B20201102 was discovered to contain a hardcoded password vulnerability in /etc/shadow.sample, which allows attackers to log in as root.

TOTOLINK CP300+ V5.2cu.7594 Denial-of-Service via RebootSystem
CVE-2023-34669 7.5 - High - July 17, 2023

TOTOLINK CP300+ V5.2cu.7594 contains a Denial of Service vulnerability in function RebootSystem of the file lib/cste_modules/system which can reboot the system.

Command Injection in TOTOLINK CP300+ V5.2cu via hostTime param
CVE-2023-31856 9.8 - Critical - May 16, 2023

A command injection vulnerability in the hostTime parameter in the function NTPSyncWithHostof TOTOLINK CP300+ V5.2cu.7594_B20200910 allows attackers to execute arbitrary commands via a crafted http packet.

Command Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Totolink Cp300 Firmware or by Totolink? Click the Watch button to subscribe.

Totolink
Vendor

subscribe