提交 #778529: TOTOLINK NR1800X NR1800X_Firmware V9.1.0u.6279_B20210910 Command Injection信息

标题TOTOLINK NR1800X NR1800X_Firmware V9.1.0u.6279_B20210910 Command Injection
描述In the NR1800X_Firmware V9.1.0u.6279_B20210910 has a command injection vulnerability in the NTPSyncWithHost function. The Var variable receives the host_time parameter from a POST request. However, since the user can control the input of host_time, the telnet service can cause a command injection vulnerability.
来源⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK-NR1800X-NTPSyncWithHost-32153a41781f8032afebc0802b704e9c?source=copy_link
用户
 wxhwxhwxh_mie (UID 66748)
提交2026-03-12 10時02分 (17 日前)
管理2026-03-27 16時56分 (15 days later)
状态已接受
VulDB条目353952 [Totolink NR1800X 9.1.0u.6279_B20210910 Telnet Service /cgi-bin/cstecgi.cgi NTPSyncWithHost host_time 权限提升]
积分15

Want to know what is going to be exploited?

We predict KEV entries!