Command Injection Vulnerability in TOTOLINK A3100R HTTP POST Request Handler
CVE-2024-7158

8.8HIGH

Key Information:

Vendor
Totolink
Status
Vendor
CVE Published:
28 July 2024

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A command injection vulnerability has been identified in the TOTOLINK A3100R router, specifically within the HTTP POST Request Handler, in the function setTelnetCfg located in the /cgi-bin/cstecgi.cgi file. An attacker can exploit this vulnerability by sending a specially crafted request that manipulates the telnet_enabled parameter. This vulnerability allows for remote command execution, potentially compromising the security of the device. The vendor has been made aware of this issue, but there has been no response regarding remediation, leaving users at risk. It is crucial for users to implement safeguards and monitor network activity to mitigate potential attacks.

Affected Version(s)

A3100R 4.1.2cu.5050_B20200504

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

yhryhryhr_tu (VulDB User)
.