| 标题 | Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection |
|---|
| 描述 | TOTOLINK EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘ip’ parameter of the setDmzCfg interface of the cstecgi .cgi. This vulnerability don't need to login, due to insufficient input validation and sanitization, an attacker can exploit this flaw by injecting malicious OS commands through the ip field. Successful exploitation allows the attacker to execute any command.
|
|---|
| 来源 | ⚠️ https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2003%20setDmzCfg-_ip.md |
|---|
| 用户 | selph (UID 82377) |
|---|
| 提交 | 2025-03-06 08時30分 (1 年前) |
|---|
| 管理 | 2025-03-07 16時44分 (1 day later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 298953 [TOTOLINK EX1800T 9.1.0cu.2112_B20220316 /cgi-bin/cstecgi.cgi setDmzCfg ip 权限提升] |
|---|
| 积分 | 20 |
|---|