Submeter #779140: Totolink A3300R 17.0.0cu.557_b20221024 Command Injectioninformação

TítuloTotolink A3300R 17.0.0cu.557_b20221024 Command Injection
Descrição The vulnerability resides within the router's shttpdservice. It allows a remote attacker to execute arbitrary operating system commands by sending a specially crafted network request. The technical root cause is a command injection flaw in the handling of user input: The attack vector is a user-supplied parameter named enable. The program flow reads this parameter in the sub_41458Cfunction and passes it to Uci_Set_Str. Subsequently, the value of the "enable" parameter is unsafely concatenated into a command string (variable v11) using snprintf. This crafted command string is then passed to the CsteSystemfunction, where it is ultimately executed by the execv()system call, leading to arbitrary command execution.
Fonte⚠️ https://github.com/LvHongW/Vuln-of-totolink_A3300R/tree/main/A3300R_enable_cmd_inject
Utilizador
 LvHW (UID 96399)
Submissão13/03/2026 03h25 (há 18 dias)
Moderação29/03/2026 19h51 (17 days later)
EstadoAceite
Entrada VulDB354128 [Totolink A3300R 17.0.0cu.557_b20221024 /cgi-bin/cstecgi.cgi setUPnPCfg enable Elevação de Privilégios]
Pontos20

Might our Artificial Intelligence support you?

Check our Alexa App!