Submit #515320: Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injectioninfo

TitleTotolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection
DescriptionTOTOLINK EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘key’ parameter of the setWiFiExtenderConfig interface of the cstecgi .cgi. This vulnerability don't need to login, due to insufficient input validation and sanitization, an attacker can exploit this flaw by injecting malicious OS commands through the key field. Successful exploitation allows the attacker to execute any command.
Source⚠️ https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2002%20setWiFiExtenderConfig-_key.md
User
 selph (UID 82377)
Submission03/06/2025 08:29 (1 Year ago)
Moderation03/07/2025 16:44 (1 day later)
StatusDuplicate
VulDB entry298952 [TOTOLINK EX1800T 9.1.0cu.2112_B20220316 /cgi-bin/cstecgi.cgi setWiFiExtenderConfig apcliKey/key os command injection]
Points0

Might our Artificial Intelligence support you?

Check our Alexa App!