Submeter #570686: TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command executioninformação

TítuloTOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution
DescriçãoA serious command execution vulnerability was discovered in TOTOLINK A3002RU V3 and A3002R_V4. The vulnerability can be triggered by the route /boafrm/formMapDelDevice. The attacker can achieve command execution by sending HTTP POST requests.
Fonte⚠️ https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/2.md
Utilizador
 BabyShark (UID 83915)
Submissão03/05/2025 10h21 (há 12 meses)
Moderação15/05/2025 09h23 (12 days later)
EstadoAceite
Entrada VulDB309031 [TOTOLINK A3002R/A3002RU 3.0.0-B20230809.1615 HTTP POST Request /boafrm/formMapDelDevice macstr Elevação de Privilégios]
Pontos17

Interested in the pricing of exploits?

See the underground prices here!