Title | TOTOLINK X18 Wireless Device V9.1.0cu.2024_B20220329 Remote Code Execution (RCE) |
---|
Description | A remote command execution (RCE) vulnerability exists in the X18 Wireless Device firmware. The `mtkhnatEnable` parameter is directly executed in the system without proper sanitization, leading to arbitrary command execution.
- **Vulnerable Function**: `sub_410C80` in binary embedded servers
- **Affected Component**: `Cstecgi.cgi`
- **Root Cause**: User-controlled `mtkhnatEnable` parameter is passed to `dosystem $a3`, which executes arbitrary system commands.
### **Impact**
An attacker can execute arbitrary system commands, gaining full control over the device, potentially leading to:
- Full system compromise
- Unauthorized access to network resources
- Deployment of persistent backdoors |
---|
Source | ⚠️ https://github.com/sjwszt/CVE/blob/main/CVE_2.md |
---|
User | Calmc1 (UID 81647) |
---|
Submission | 02/21/2025 11:17 AM (4 months ago) |
---|
Moderation | 03/01/2025 08:44 PM (8 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 298096 [TOTOLINK X18 9.1.0cu.2024_B20220329 /cgi-bin/cstecgi.cgi setMtknatCfg mtkhnatEnable os command injection] |
---|
Points | 20 |
---|