提交 #779536: TOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection信息

标题TOTOLINK A3600R A3600R V4.1.2cu.5182_B20201102 Command Injection
描述In the A3600R V4.1.2cu.5182_B20201102 firmware has a contain a pre-auth remote command execution vulnerability in the setNoticeCfg function through the NoticeUrl parameter. The NoticeUrl is user-controllable. The GetDomainName function extracts the domain part from the URL and assigns it to v36. Subsequently, it enters the validity_check function to verify whether special characters are present. If special characters are included, it directly returns.
来源⚠️ https://lavender-bicycle-a5a.notion.site/TOTOLINK_A3600R_setNoticeCfg-32253a41781f80c197eaf8e7558c5ed1?source=copy_link
用户
 wxhwxhwxh_mie (UID 66748)
提交2026-03-13 16時11分 (16 日前)
管理2026-03-27 15時15分 (14 days later)
状态已接受
VulDB条目353905 [Totolink A3600R 4.1.2cu.5182_B20201102 Parameter /cgi-bin/cstecgi.cgi setNoticeCfg NoticeUrl 权限提升]
积分17

Interested in the pricing of exploits?

See the underground prices here!