Submit #504983: TOTOLINK X18 Wireless Device V9.1.0cu.2024_B20220329 Remote Code Execution (RCE)info

TitleTOTOLINK X18 Wireless Device V9.1.0cu.2024_B20220329 Remote Code Execution (RCE)
DescriptionA remote command execution (RCE) vulnerability exists in the X18 Wireless Device firmware. The `mtkhnatEnable` parameter is directly executed in the system without proper sanitization, leading to arbitrary command execution. - **Vulnerable Function**: `sub_410C80` in binary embedded servers - **Affected Component**: `Cstecgi.cgi` - **Root Cause**: User-controlled `mtkhnatEnable` parameter is passed to `dosystem $a3`, which executes arbitrary system commands. ### **Impact** An attacker can execute arbitrary system commands, gaining full control over the device, potentially leading to: - Full system compromise - Unauthorized access to network resources - Deployment of persistent backdoors
Source⚠️ https://github.com/sjwszt/CVE/blob/main/CVE_2.md
User
 Calmc1 (UID 81647)
Submission02/21/2025 11:17 AM (4 months ago)
Moderation03/01/2025 08:44 PM (8 days later)
StatusAccepted
VulDB Entry298096 [TOTOLINK X18 9.1.0cu.2024_B20220329 /cgi-bin/cstecgi.cgi setMtknatCfg mtkhnatEnable os command injection]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!