提出 #752063: TOTOLINK WA300 V5.2cu.7112_B20190227 OS Command Injection情報

タイトルTOTOLINK WA300 V5.2cu.7112_B20190227 OS Command Injection
説明The TOTOLINK WA300 router has a serious security vulnerability when handling web requests. This vulnerability lies in the processing logic of the setting/setAPNetwork interface. Attackers can inject specific shell characters into the Ipaddr parameter by constructing malicious POST requests. Since the server side does not perform effective filtering or verification on this parameter, and directly concatenates it to the system command for execution, unauthorized remote attackers can execute arbitrary system commands with Root privileges on the device.
ソース⚠️ https://github.com/master-abc/cve/issues/36
ユーザー
 jiefengliang (UID 93721)
送信2026年02月04日 17:15 (3 月 ago)
モデレーション2026年02月07日 10:15 (3 days later)
ステータス承諾済み
VulDBエントリ344869 [Totolink WA300 5.2cu.7112_B20190227 /cgi-bin/cstecgi.cgi setAPNetwork Ipaddr 特権昇格]
ポイント20

Do you know our Splunk app?

Download it now for free!