Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8mrx-w38v-p44j

Опубликовано: 13 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the cloudupdate_check binary, specifically in the sub_402414 function that handles cloud update parameters. User-supplied 'magicid' and 'url' values are directly concatenated into shell commands and executed via system() without any sanitization or escaping. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device.

A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the cloudupdate_check binary, specifically in the sub_402414 function that handles cloud update parameters. User-supplied 'magicid' and 'url' values are directly concatenated into shell commands and executed via system() without any sanitization or escaping. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device.

EPSS

Процентиль: 82%
0.01684
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 6.5
nvd
около 1 месяца назад

A command injection vulnerability exists in the ToToLink A720R Router firmware V4.1.5cu.614_B20230630 within the cloudupdate_check binary, specifically in the sub_402414 function that handles cloud update parameters. User-supplied 'magicid' and 'url' values are directly concatenated into shell commands and executed via system() without any sanitization or escaping. An unauthenticated remote attacker can exploit this vulnerability to execute arbitrary commands on the device.

CVSS3: 6.5
fstec
2 месяца назад

Уязвимость функции sub_402414() микропрограммного обеспечения роутеров TOTOLINK A720R, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 82%
0.01684
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-77