제출 #779140: Totolink A3300R 17.0.0cu.557_b20221024 Command Injection정보

제목Totolink A3300R 17.0.0cu.557_b20221024 Command Injection
설명 The vulnerability resides within the router's shttpdservice. It allows a remote attacker to execute arbitrary operating system commands by sending a specially crafted network request. The technical root cause is a command injection flaw in the handling of user input: The attack vector is a user-supplied parameter named enable. The program flow reads this parameter in the sub_41458Cfunction and passes it to Uci_Set_Str. Subsequently, the value of the "enable" parameter is unsafely concatenated into a command string (variable v11) using snprintf. This crafted command string is then passed to the CsteSystemfunction, where it is ultimately executed by the execv()system call, leading to arbitrary command execution.
원천⚠️ https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_enable_cmd_inject
사용자
 LvHW (UID 96399)
제출2026. 03. 13. AM 03:25 (17 날 ago)
모더레이션2026. 03. 29. PM 07:51 (17 days later)
상태수락
VulDB 항목354128 [Totolink A3300R 17.0.0cu.557_b20221024 /cgi-bin/cstecgi.cgi setUPnPCfg enable 권한 상승]
포인트들20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!