| 标题 | Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection |
|---|
| 描述 | TOTOLINK EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘apcliKey’ parameter of the setWiFiExtenderConfig interface of the cstecgi .cgi. This vulnerability don't need to login, due to insufficient input validation and sanitization, an attacker can exploit this flaw by injecting malicious OS commands through the apcliKey field. Successful exploitation allows the attacker to execute any command. |
|---|
| 来源 | ⚠️ https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2001%20setWiFiExtenderConfig-_apcliKey.md |
|---|
| 用户 | selph (UID 82377) |
|---|
| 提交 | 2025-03-06 08時26分 (1 年前) |
|---|
| 管理 | 2025-03-07 16時44分 (1 day later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 298952 [TOTOLINK EX1800T 9.1.0cu.2112_B20220316 /cgi-bin/cstecgi.cgi setWiFiExtenderConfig apcliKey/key 权限提升] |
|---|
| 积分 | 20 |
|---|