Ca300-Poe Firmware

by Totolink

Take action — actively targeted

Ca300-Poe Firmware is actively targeted by attackers. A significant proportion of its known vulnerabilities are being exploited.

What to do
  1. Apply all available updates immediately
  2. Review your exposure — is this internet-facing?
  3. Monitor vendor advisories for this product

What Attackers Target

Vulnerabilities with high exploit probability 54.2%
Confirmed actively exploited (CISA) 0.0%
Public exploit code available 0.0%
Based on 24 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.

Most Dangerous Vulnerabilities

CVE CVSS Exploit Probability Confirmed
CVE-2023-24138 9.8 14.9%
CVE-2023-24139 9.8 14.9%
CVE-2023-24140 9.8 14.9%
CVE-2023-24141 9.8 14.9%
CVE-2023-24142 9.8 14.9%
CVE-2023-24143 9.8 14.9%
CVE-2023-24144 9.8 14.9%
CVE-2023-24145 9.8 14.9%
CVE-2023-24146 9.8 14.9%
CVE-2023-24148 9.8 14.9%
CVE-2023-24159 9.8 14.9%
CVE-2023-24160 9.8 14.9%
CVE-2023-24161 9.8 14.9%
CVE-2025-44862 6.3 10.0%
CVE-2025-44861 6.3 10.0%
CVE-2024-7217 6.3 8.5%
CVE-2025-44863 6.5 7.9%
CVE-2025-44860 6.5 7.9%
CVE-2025-6619 6.3 2.2%
CVE-2025-6621 6.3 2.2%
50
/ 100
high-risk
Active Threat 50/50 · Critical
Exploit Availability 0/50 · Minimal

Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.