Описание
A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-7524
- https://github.com/ElvisBlue/Public/blob/main/Vuln/2.md
- https://github.com/ElvisBlue/Public/blob/main/Vuln/2.md#poc
- https://vuldb.com/?ctiid.316221
- https://vuldb.com/?id.316221
- https://vuldb.com/?submit.612935
- https://www.totolink.net
- https://www.youtube.com/watch?v=T62BuSoHmoM
Связанные уязвимости
A vulnerability was found in TOTOLINK T6 4.1.5cu.748_B20211015. It has been classified as critical. This affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument ip leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Уязвимость функции setDiagnosisCfg() сценария cstecgi.cgi микропрограммного обеспечения mesh-системы TOTOLink T6, позволяющая нарушителю выполнить произвольный код