{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-03T12:46:00.858","vulnerabilities":[{"cve":{"id":"CVE-2018-13307","sourceIdentifier":"cve@mitre.org","published":"2018-11-27T20:29:00.457","lastModified":"2024-11-21T03:46:49.630","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"System command injection in fromNtp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the \"ntpServerIp2\" POST parameter. Certain payloads cause the device to become permanently inoperable."},{"lang":"es","value":"Inyección de comandos del sistema en fromNtp en TOTOLINK A3002RU en su versión 1.0.8 permite que los atacantes ejecuten comandos del sistema mediante el parámetro POST \"ntpServerIp2\". Ciertas cargas útiles provocan que el dispositivo se vuelva inoperativo permanentemente."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:totolink:a3002ru_firmware:1.0.8:*:*:*:*:*:*:*","matchCriteriaId":"E3280CDA-877A-4BCE-9919-5A8D58D7EBFC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*","matchCriteriaId":"21945D3C-27AA-4614-8D5D-C22DE8C56F94"}]}]}],"references":[{"url":"https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f42a081154","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}