Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f336-wh5w-hf9v

Опубликовано: 16 мая 2025
Источник: github
Github: Не прошло ревью
CVSS4: 5.3
CVSS3: 6.3

Описание

A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMapDelDevice of the component HTTP POST Request Handler. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMapDelDevice of the component HTTP POST Request Handler. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 73%
0.00745
Низкий

5.3 Medium

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 6.3
nvd
9 месяцев назад

A vulnerability was found in TOTOLINK A3002R and A3002RU 3.0.0-B20230809.1615. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formMapDelDevice of the component HTTP POST Request Handler. The manipulation of the argument macstr leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
fstec
9 месяцев назад

Уязвимость компонента HTTP POST Request Handler микропрограммного обеспечения роутеров TOTOLINK A3002R и A3002RU, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 73%
0.00745
Низкий

5.3 Medium

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74