漏洞标题
TOTOLINK X18 cstecgi.cgi setL2tpdConfig OS命令注入漏洞
漏洞描述信息
在TOTOLINK X18 9.1.0cu.2024_B20220329版本中发现了一个漏洞,该漏洞被评定为严重级别。该问题影响文件 `/cgi-bin/cstecgi.cgi` 中的 `setL2tpdConfig` 函数。对参数 `enable` 的操作可能导致操作系统命令注入。该攻击可以从远程发起。漏洞的利用细节已公开披露,可能被利用。厂商已提前通知此漏洞,但未作出任何回应。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
漏洞标题
TOTOLINK X18 cstecgi.cgi setL2tpdConfig os command injection
漏洞描述信息
A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been rated as critical. This issue affects the function setL2tpdConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)