漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
TOTOLINK AC1200 T8 cstecgi.cgi setParentalRules os command injection
Vulnerability Description
A vulnerability has been found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 and classified as critical. This vulnerability affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument slaveIpList leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
TOTOLINK AC1200 操作系统命令注入漏洞
Vulnerability Description
TOTOLINK AC1200是中国吉翁电子(TOTOLINK)公司的一款双频 Wi-Fi 路由器。 TOTOLINK AC1200 T8 4.1.5cu.861_B20230220版本存在操作系统命令注入漏洞,该漏洞源于/cgi-bin/cstecgi.cgi页面的setParentalRules方法中的slaveIpList参数包含一个操作系统命令注入漏洞。
CVSS Information
N/A
Vulnerability Type
N/A