제출 #570686: TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution정보

제목TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution
설명A serious command execution vulnerability was discovered in TOTOLINK A3002RU V3 and A3002R_V4. The vulnerability can be triggered by the route /boafrm/formMapDelDevice. The attacker can achieve command execution by sending HTTP POST requests.
원천⚠️ https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/2.md
사용자
 BabyShark (UID 83915)
제출2025. 05. 03. AM 10:21 (12 개월 ago)
모더레이션2025. 05. 15. AM 09:23 (12 days later)
상태수락
VulDB 항목309031 [TOTOLINK A3002R/A3002RU 3.0.0-B20230809.1615 HTTP POST Request /boafrm/formMapDelDevice macstr 권한 상승]
포인트들17

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!