{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T13:04:58.526","vulnerabilities":[{"cve":{"id":"CVE-2023-51035","sourceIdentifier":"cve@mitre.org","published":"2023-12-22T19:15:09.920","lastModified":"2024-11-21T08:37:44.880","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TOTOLINK EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution on the cstecgi.cgi NTPSyncWithHost interface."},{"lang":"es","value":"TOTOLINK EX1200L V9.3.5u.6146_B20201023 es vulnerable a la ejecución de comandos arbitrarios en la interfaz cstecgi.cgi NTPSyncWithHost."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:totolink:ex1200l_firmware:9.3.5u.6146_b20201023:*:*:*:*:*:*:*","matchCriteriaId":"F2A5A448-0444-4DA7-8C74-66AA5300D40D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:totolink:ex1200l:-:*:*:*:*:*:*:*","matchCriteriaId":"A4BC1501-2EAC-43B7-83E0-04FBA874D29D"}]}]}],"references":[{"url":"https:\/\/815yang.github.io\/2023\/12\/12\/ex1200l\/totolink_ex1200L_NTPSyncWithHost\/","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https:\/\/815yang.github.io\/2023\/12\/12\/ex1200l\/totolink_ex1200L_NTPSyncWithHost\/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}