Description
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "command" parameter is directly passed to the attacker, allowing them to control the "command" field to attack the OS.
Related CPE's
References
https://hackmd.io/7FtB06f-SJ-SCfkMYcXYxA
https://hackmd.io/mDgIBvoxSPCZrZiZjfQGhw
https://hackmd.io/7FtB06f-SJ-SCfkMYcXYxA
https://hackmd.io/mDgIBvoxSPCZrZiZjfQGhw
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-14T14:15:14.127Z
4 years agoLast modified
2024-11-21T04:58:27.993Z
1 year ago