Soumettre #779536: TOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injectioninformation

TitreTOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection
DescriptionIn the A3600R V4.1.2cu.5182_B20201102 firmware has a contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. The NoticeUrl is user-controllable. The GetDomainName function extracts the domain part from the URL and assigns it to v36. Subsequently, it enters the validity_check function to verify whether special characters are present. If special characters are included, it directly returns.
La source⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK_A3600R_setNoticeCfg-32253a41781f80c197eaf8e7558c5ed1?source=copy_link
Utilisateur
 wxhwxhwxh_mie (UID 66748)
Soumission13/03/2026 16:11 (il y a 16 jours)
Modérer27/03/2026 15:15 (14 days later)
StatutAccepté
Entrée VulDB353905 [Totolink A3600R 4.1.2cu.5182_B20201102 Parameter /cgi-bin/cstecgi.cgi setNoticeCfg NoticeUrl élévation de privilèges]
Points17

Interested in the pricing of exploits?

See the underground prices here!