Command Injection Vulnerability in TOTOLINK A3100R HTTP POST Request Handler
CVE-2024-7158
Key Information:
Badges
Summary
A command injection vulnerability has been identified in the TOTOLINK A3100R router, specifically within the HTTP POST Request Handler, in the function setTelnetCfg located in the /cgi-bin/cstecgi.cgi file. An attacker can exploit this vulnerability by sending a specially crafted request that manipulates the telnet_enabled parameter. This vulnerability allows for remote command execution, potentially compromising the security of the device. The vendor has been made aware of this issue, but there has been no response regarding remediation, leaving users at risk. It is crucial for users to implement safeguards and monitor network activity to mitigate potential attacks.
Affected Version(s)
A3100R 4.1.2cu.5050_B20200504
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved