| Título | TOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection |
|---|
| Descripción | In the A3600R V4.1.2cu.5182_B20201102 firmware has a contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. The NoticeUrl is user-controllable. The GetDomainName function extracts the domain part from the URL and assigns it to v36. Subsequently, it enters the validity_check function to verify whether special characters are present. If special characters are included, it directly returns. |
|---|
| Fuente | ⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK_A3600R_setNoticeCfg-32253a41781f80c197eaf8e7558c5ed1?source=copy_link |
|---|
| Usuario | wxhwxhwxh_mie (UID 66748) |
|---|
| Sumisión | 2026-03-13 16:11 (hace 16 días) |
|---|
| Moderación | 2026-03-27 15:15 (14 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 353905 [Totolink A3600R 4.1.2cu.5182_B20201102 Parameter /cgi-bin/cstecgi.cgi setNoticeCfg NoticeUrl escalada de privilegios] |
|---|
| Puntos | 17 |
|---|