| Titre | TOTOLINK NR1800X NR1800X_Firmware V9.1.0u.6279_B20210910 Command Injection |
|---|
| Description | In the NR1800X_Firmware V9.1.0u.6279_B20210910 has a command injection vulnerability in the NTPSyncWithHost function. The Var variable receives the host_time parameter from a POST request. However, since the user can control the input of host_time, the telnet service can cause a command injection vulnerability. |
|---|
| La source | ⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK-NR1800X-NTPSyncWithHost-32153a41781f8032afebc0802b704e9c?source=copy_link |
|---|
| Utilisateur | wxhwxhwxh_mie (UID 66748) |
|---|
| Soumission | 12/03/2026 10:02 (il y a 17 jours) |
|---|
| Modérer | 27/03/2026 16:56 (15 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 353952 [Totolink NR1800X 9.1.0u.6279_B20210910 Telnet Service /cgi-bin/cstecgi.cgi NTPSyncWithHost host_time élévation de privilèges] |
|---|
| Points | 15 |
|---|