| Título | TOTOLINK LR350 LR350 V9.3.5u.6369_B20220309 Command Injection |
|---|
| Descripción | In the LR350 V9.3.5u.6369_B20220309 firmware has a command injection vulnerability in the setTracerouteCfg function. The Var variable receives the command parameter from a POST request. However, since the user can control the input of command, the doSystem can cause a command injection vulnerability. |
|---|
| Fuente | ⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK-LR350-setTracerouteCfg-2e453a41781f803494e3e4161a393487?source=copy_link |
|---|
| Usuario | wxhwxhwxh_tutu (UID 65923) |
|---|
| Sumisión | 2026-01-10 04:03 (hace 2 meses) |
|---|
| Moderación | 2026-01-18 14:55 (8 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 341743 [Totolink LR350 9.3.5u.6369_B20220309 POST Request /cgi-bin/cstecgi.cgi setTracerouteCfg command escalada de privilegios] |
|---|
| Puntos | 15 |
|---|