| Titre | TOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection |
|---|
| Description | In the A3600R V4.1.2cu.5182_B20201102 firmware has a contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. The NoticeUrl is user-controllable. The GetDomainName function extracts the domain part from the URL and assigns it to v36. Subsequently, it enters the validity_check function to verify whether special characters are present. If special characters are included, it directly returns. |
|---|
| La source | ⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK_A3600R_setNoticeCfg-32253a41781f80c197eaf8e7558c5ed1?source=copy_link |
|---|
| Utilisateur | wxhwxhwxh_mie (UID 66748) |
|---|
| Soumission | 13/03/2026 16:11 (il y a 16 jours) |
|---|
| Modérer | 27/03/2026 15:15 (14 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 353905 [Totolink A3600R 4.1.2cu.5182_B20201102 Parameter /cgi-bin/cstecgi.cgi setNoticeCfg NoticeUrl élévation de privilèges] |
|---|
| Points | 17 |
|---|