Enviar #778529: TOTOLINK NR1800X NR1800X_Firmware V9.1.0u.6279_B20210910 Command Injectioninformación

TítuloTOTOLINK NR1800X NR1800X_Firmware V9.1.0u.6279_B20210910 Command Injection
DescripciónIn the NR1800X_Firmware V9.1.0u.6279_B20210910 has a command injection vulnerability in the NTPSyncWithHost function. The Var variable receives the host_time parameter from a POST request. However, since the user can control the input of host_time, the telnet service can cause a command injection vulnerability.
Fuente⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK-NR1800X-NTPSyncWithHost-32153a41781f8032afebc0802b704e9c?source=copy_link
Usuario
 wxhwxhwxh_mie (UID 66748)
Sumisión2026-03-12 10:02 (hace 17 días)
Moderación2026-03-27 16:56 (15 days later)
EstadoAceptado
Entrada de VulDB353952 [Totolink NR1800X 9.1.0u.6279_B20210910 Telnet Service /cgi-bin/cstecgi.cgi NTPSyncWithHost host_time escalada de privilegios]
Puntos15

Do you know our Splunk app?

Download it now for free!