제출 #752063: TOTOLINK WA300 V5.2cu.7112_B20190227 OS Command Injection정보

제목TOTOLINK WA300 V5.2cu.7112_B20190227 OS Command Injection
설명The TOTOLINK WA300 router has a serious security vulnerability when handling web requests. This vulnerability lies in the processing logic of the setting/setAPNetwork interface. Attackers can inject specific shell characters into the Ipaddr parameter by constructing malicious POST requests. Since the server side does not perform effective filtering or verification on this parameter, and directly concatenates it to the system command for execution, unauthorized remote attackers can execute arbitrary system commands with Root privileges on the device.
원천⚠️ https://github.com/master-abc/cve/issues/36
사용자
 jiefengliang (UID 93721)
제출2026. 02. 04. PM 05:15 (3 개월 ago)
모더레이션2026. 02. 07. AM 10:15 (3 days later)
상태수락
VulDB 항목344869 [Totolink WA300 5.2cu.7112_B20190227 /cgi-bin/cstecgi.cgi setAPNetwork Ipaddr 권한 상승]
포인트들20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!