Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wpgv-345q-6vm7

Опубликовано: 29 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

EPSS

Процентиль: 87%
0.03174
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 6.3
nvd
9 дней назад

A weakness has been identified in Totolink A7000R 4.1cu.4154. The impacted element is the function setUploadUserData of the file /cgi-bin/cstecgi.cgi. Executing a manipulation of the argument FileName can lead to command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

EPSS

Процентиль: 87%
0.03174
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74