Gửi #752063: TOTOLINK WA300 V5.2cu.7112_B20190227 OS Command Injectionthông tin

tiêu đềTOTOLINK WA300 V5.2cu.7112_B20190227 OS Command Injection
Mô tảThe TOTOLINK WA300 router has a serious security vulnerability when handling web requests. This vulnerability lies in the processing logic of the setting/setAPNetwork interface. Attackers can inject specific shell characters into the Ipaddr parameter by constructing malicious POST requests. Since the server side does not perform effective filtering or verification on this parameter, and directly concatenates it to the system command for execution, unauthorized remote attackers can execute arbitrary system commands with Root privileges on the device.
Nguồn⚠️ https://github.com/master-abc/cve/issues/36
Người dùng
 jiefengliang (UID 93721)
Đệ trình04/02/2026 17:15 (cách đây 3 các tháng)
Kiểm duyệt07/02/2026 10:15 (3 days later)
Trạng tháiđược chấp nhận
Mục VulDB344869 [Totolink WA300 5.2cu.7112_B20190227 /cgi-bin/cstecgi.cgi setAPNetwork Ipaddr nâng cao đặc quyền]
điểm20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!