Remote Command Injection in TOTOLINK A3600R Network Device
CVE-2024-7181
Key Information:
Badges
Summary
A serious command injection vulnerability has been identified in the TOTOLINK A3600R device, specifically within the setTelnetCfg function of the cstecgi.cgi file. An attacker can exploit this vulnerability by manipulating the 'telnet_enabled' argument, enabling unauthorized command execution. This issue allows remote attackers to gain access and potentially execute arbitrary code, compromising device integrity and network security. It is paramount for users and administrators of affected products to assess their current security measures and apply necessary updates or mitigations to protect their information systems.
Affected Version(s)
A3600R 4.1.2cu.5182_B20201102
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved