| Title | TOTOLINK NR1800X NR1800X_Firmware V9.1.0u.6279_B20210910 Command Injection |
|---|
| Description | In the NR1800X_Firmware V9.1.0u.6279_B20210910 has a command injection vulnerability in the NTPSyncWithHost function. The Var variable receives the host_time parameter from a POST request. However, since the user can control the input of host_time, the telnet service can cause a command injection vulnerability. |
|---|
| Source | ⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK-NR1800X-NTPSyncWithHost-32153a41781f8032afebc0802b704e9c?source=copy_link |
|---|
| User | wxhwxhwxh_mie (UID 66748) |
|---|
| Submission | 03/12/2026 10:02 (17 days ago) |
|---|
| Moderation | 03/27/2026 16:56 (15 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 353952 [Totolink NR1800X 9.1.0u.6279_B20210910 Telnet Service /cgi-bin/cstecgi.cgi NTPSyncWithHost host_time command injection] |
|---|
| Points | 15 |
|---|