Enviar #570686: TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command executioninformación

TítuloTOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution
DescripciónA serious command execution vulnerability was discovered in TOTOLINK A3002RU V3 and A3002R_V4. The vulnerability can be triggered by the route /boafrm/formMapDelDevice. The attacker can achieve command execution by sending HTTP POST requests.
Fuente⚠️ https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/2.md
Usuario
 BabyShark (UID 83915)
Sumisión2025-05-03 10:21 (hace 12 meses)
Moderación2025-05-15 09:23 (12 days later)
EstadoAceptado
Entrada de VulDB309031 [TOTOLINK A3002R/A3002RU 3.0.0-B20230809.1615 HTTP POST Request /boafrm/formMapDelDevice macstr escalada de privilegios]
Puntos17

Want to know what is going to be exploited?

We predict KEV entries!