Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mwpg-84jx-gc55

Опубликовано: 22 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 94%
0.1236
Средний

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 6.3
nvd
2 месяца назад

A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 6.3
fstec
2 месяца назад

Уязвимость функции formWlSiteSurvey() файла /boafrm/formWlSiteSurvey микропрограммного обеспечения роутеров TOTOLINK A3002R, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 94%
0.1236
Средний

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-77