OS Command Injection Vulnerability in TOTOLINK A720R Router
CVE-2024-8869
8.1HIGH
Summary
A critical security vulnerability has been identified in the TOTOLINK A720R router, specifically in the exportOvpn function. This flaw allows for OS command injection, posing a significant risk as it could be exploited remotely by attackers. The attack complexity is categorized as high, making it exceedingly challenging for the average user to mitigate without the necessary security measures in place. As of the last report, the vendor has not responded to advisories regarding this vulnerability, leaving devices susceptible to potential exploits. Users are advised to monitor their systems closely and apply necessary security patches or measures as they become available.
Affected Version(s)
A720R 4.1.5
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
Cl0wnK1n9 (VulDB User)