提交 #515319: Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection信息

标题Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection
描述TOTOLINK EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘apcliKey’ parameter of the setWiFiExtenderConfig interface of the cstecgi .cgi. This vulnerability don't need to login, due to insufficient input validation and sanitization, an attacker can exploit this flaw by injecting malicious OS commands through the apcliKey field. Successful exploitation allows the attacker to execute any command.
来源⚠️ https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2001%20setWiFiExtenderConfig-_apcliKey.md
用户
 selph (UID 82377)
提交2025-03-06 08時26分 (1 年前)
管理2025-03-07 16時44分 (1 day later)
状态已接受
VulDB条目298952 [TOTOLINK EX1800T 9.1.0cu.2112_B20220316 /cgi-bin/cstecgi.cgi setWiFiExtenderConfig apcliKey/key 权限提升]
积分20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!