提交 #515325: Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection信息

标题Totolink EX1800T V9.1.0cu.2112_B20220316 OS Command Injection
描述TOTOLINK EX1800T V9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the ‘recHour’ parameter of the setRebootScheCfg interface of the cstecgi .cgi. This vulnerability don't need to login, due to insufficient input validation and sanitization, an attacker can exploit this flaw by injecting malicious OS commands through the recHour field. Successful exploitation allows the attacker to execute any command.
来源⚠️ https://github.com/kn0sky/cve/blob/main/TOTOLINK%20EX1800T/OS%20Command%20Injection%2007%20setRebootScheCfg-_recHour.md
用户
 selph (UID 82377)
提交2025-03-06 08時32分 (1 年前)
管理2025-03-07 16時45分 (1 day later)
状态重复
VulDB条目298954 [TOTOLINK EX1800T 9.1.0cu.2112_B20220316 /cgi-bin/cstecgi.cgi setRebootScheCfg mode/week/minute/recHour 权限提升]
积分0

Do you know our Splunk app?

Download it now for free!