提出 #779536: TOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection情報

タイトルTOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection
説明In the A3600R V4.1.2cu.5182_B20201102 firmware has a contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. The NoticeUrl is user-controllable. The GetDomainName function extracts the domain part from the URL and assigns it to v36. Subsequently, it enters the validity_check function to verify whether special characters are present. If special characters are included, it directly returns.
ソース⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK_A3600R_setNoticeCfg-32253a41781f80c197eaf8e7558c5ed1?source=copy_link
ユーザー
 wxhwxhwxh_mie (UID 66748)
送信2026年03月13日 16:11 (16 日 ago)
モデレーション2026年03月27日 15:15 (14 days later)
ステータス承諾済み
VulDBエントリ353905 [Totolink A3600R 4.1.2cu.5182_B20201102 Parameter /cgi-bin/cstecgi.cgi setNoticeCfg NoticeUrl 特権昇格]
ポイント17

Might our Artificial Intelligence support you?

Check our Alexa App!