Описание
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Ссылки
- Exploit
- Exploit
- Permissions RequiredVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Product
Уязвимые конфигурации
Одновременно
EPSS
6.5 Medium
CVSS3
5.3 Medium
CVSS3
6.4 Medium
CVSS2
Дефекты
Связанные уязвимости
A vulnerability was found in TOTOLINK A720R 4.1.5cu.374 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/cstecgi.cgi of the component Log Handler. The manipulation of the argument topicurl with the input clearDiagnosisLog/clearSyslog/clearTracerouteLog leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Уязвимость сценария cstecgi.cgi (/cgi-bin/cstecgi.cgi) микропрограммного обеспечения роутеров TOTOLINK A720R, позволяющая нарушителю повысить свои привилегии
EPSS
6.5 Medium
CVSS3
5.3 Medium
CVSS3
6.4 Medium
CVSS2