OS Command Injection Vulnerability in TOTOLINK X5000R Router
CVE-2024-57025
6.8MEDIUM
Summary
An OS command injection vulnerability has been identified in the TOTOLINK X5000R router. This issue arises from improper validation of the 'desc' parameter in the setWiFiScheduleCfg function, which allows attackers to execute arbitrary operating system commands. When exploited, this vulnerability may lead to unauthorized access or control over the device, potentially compromising the security and privacy of users' networks.
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved