提交 #515321: Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection信息

标题Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection
描述TOTOLINK EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘ip’ parameter of the setDmzCfg interface of the cstecgi .cgi. This vulnerability don't need to login, due to insufficient input validation and sanitization, an attacker can exploit this flaw by injecting malicious OS commands through the ip field. Successful exploitation allows the attacker to execute any command.
来源⚠️ https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2003%20setDmzCfg-_ip.md
用户
 selph (UID 82377)
提交2025-03-06 08時30分 (1 年前)
管理2025-03-07 16時44分 (1 day later)
状态已接受
VulDB条目298953 [TOTOLINK EX1800T 9.1.0cu.2112_B20220316 /cgi-bin/cstecgi.cgi setDmzCfg ip 权限提升]
积分20

Do you want to use VulDB in your project?

Use the official API to access entries easily!