提交 #570686: TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution信息

标题TOTOLINK A3002RU V3/A3002R_V4 V3.0.0-B20230809.1615 Command execution
描述A serious command execution vulnerability was discovered in TOTOLINK A3002RU V3 and A3002R_V4. The vulnerability can be triggered by the route /boafrm/formMapDelDevice. The attacker can achieve command execution by sending HTTP POST requests.
来源⚠️ https://github.com/CH13hh/tmp_store_cc/blob/main/tt/ta/2.md
用户
 BabyShark (UID 83915)
提交2025-05-03 10時21分 (12 月前)
管理2025-05-15 09時23分 (12 days later)
状态已接受
VulDB条目309031 [TOTOLINK A3002R/A3002RU 3.0.0-B20230809.1615 HTTP POST Request /boafrm/formMapDelDevice macstr 权限提升]
积分17

Do you want to use VulDB in your project?

Use the official API to access entries easily!