| 标题 | TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution |
|---|
| 描述 | A serious command execution vulnerability was discovered in TOTOLINK A3002RU V3 and A3002R_V4. The vulnerability can be triggered by the route /boafrm/formMapDelDevice. The attacker can achieve command execution by sending HTTP POST requests. |
|---|
| 来源 | ⚠️ https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/2.md |
|---|
| 用户 | BabyShark (UID 83915) |
|---|
| 提交 | 2025-05-03 10時21分 (12 月前) |
|---|
| 管理 | 2025-05-15 09時23分 (12 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 309031 [TOTOLINK A3002R/A3002RU 3.0.0-B20230809.1615 HTTP POST Request /boafrm/formMapDelDevice macstr 权限提升] |
|---|
| 积分 | 17 |
|---|