Описание
A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2026-1547
- https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md
- https://github.com/xyh4ck/iot_poc/blob/main/TOTOLINK/A7000R/01_RCE_setUnloadUserData_RCE.md#poc
- https://vuldb.com/?ctiid.343231
- https://vuldb.com/?id.343231
- https://vuldb.com/?submit.739713
- https://www.totolink.net
Связанные уязвимости
A vulnerability was detected in Totolink A7000R 4.1cu.4154. This affects the function setUnloadUserData of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument plugin_name results in command injection. It is possible to launch the attack remotely. The exploit is now public and may be used.
Уязвимость функции setUnloadUserData() сценария /cgi-bin/cstecgi.cgi микропрограммного обеспечения роутеров TOTOLINK A7000R, позволяющая нарушителю выполнить произвольные команды