Отправить #779536: TOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command InjectionИнформация

НазваниеTOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection
ОписаниеIn the A3600R V4.1.2cu.5182_B20201102 firmware has a contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. The NoticeUrl is user-controllable. The GetDomainName function extracts the domain part from the URL and assigns it to v36. Subsequently, it enters the validity_check function to verify whether special characters are present. If special characters are included, it directly returns.
Источник⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK_A3600R_setNoticeCfg-32253a41781f80c197eaf8e7558c5ed1?source=copy_link
Пользователь
 wxhwxhwxh_mie (UID 66748)
Представление13.03.2026 16:11 (16 дни назад)
Модерация27.03.2026 15:15 (14 days later)
Статуспринято
Запись VulDB353905 [Totolink A3600R 4.1.2cu.5182_B20201102 Parameter /cgi-bin/cstecgi.cgi setNoticeCfg NoticeUrl эскалация привилегий]
Баллы17

Do you know our Splunk app?

Download it now for free!