Command Injection Vulnerability in TOTOLINK Router
CVE-2024-57036
8.1HIGH
Summary
The TOTOLINK A810R router is susceptible to a command injection vulnerability within the downloadFile.cgi function. This flaw enables a malicious actor to craft specific HTTP requests that can execute arbitrary commands on the router's system, potentially compromising device integrity and network security. Users are encouraged to update their firmware to protect against this vulnerability.
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved