إرسال #749712: UTT (艾泰) UTT521G NV521Gv2v3.1.1-190816 Command Injectionالمعلومات

عنوانUTT (艾泰) UTT521G NV521Gv2v3.1.1-190816 Command Injection
الوصفA critical security vulnerability has been discovered in the web management component of the AiTai (UTT) 521G router. The vulnerability exists in the backend setSysAdm handler. By manipulating the passwd1 parameter under the /goform/setSysAdm path, an attacker can exploit improper input validation to perform command injection. Since the system directly concatenates unfiltered user input into shell commands for execution, a remote attacker can leverage this to execute arbitrary system commands on affected devices, thereby gaining full Root privileges.
المصدر⚠️ https://github.com/cha0yang1/UTT521G/blob/main/RCE1.md
المستخدم
 cha0yang (UID 94272)
ارسال31/01/2026 11:21 AM (3 أشهر منذ)
الاعتدال07/02/2026 04:23 PM (7 days later)
الحالةتمت الموافقة
إدخال VulDB344885 [UTT 进取 521G 3.1.1-190816 /goform/setSysAdm doSystem passwd1 تجاوز الصلاحيات]
النقاط20

Do you want to use VulDB in your project?

Use the official API to access entries easily!