| Título | TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution |
|---|
| Descripción | A serious command execution vulnerability was discovered in TOTOLINK A3002RU V3 and A3002R_V4. The vulnerability can be triggered by the route /boafrm/formMapDelDevice. The attacker can achieve command execution by sending HTTP POST requests. |
|---|
| Fuente | ⚠️ https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/2.md |
|---|
| Usuario | BabyShark (UID 83915) |
|---|
| Sumisión | 2025-05-03 10:21 (hace 12 meses) |
|---|
| Moderación | 2025-05-15 09:23 (12 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 309031 [TOTOLINK A3002R/A3002RU 3.0.0-B20230809.1615 HTTP POST Request /boafrm/formMapDelDevice macstr escalada de privilegios] |
|---|
| Puntos | 17 |
|---|