Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
TOTOLINK CA300-PoE upgrade.so setUpgradeUboot os command injection
Vulnerability Description
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been rated as critical. Affected by this issue is the function setUpgradeUboot of the file upgrade.so. The manipulation of the argument FileName leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
TOTOLINK CA300-PoE 命令注入漏洞
Vulnerability Description
TOTOLINK CA300-PoE是中国吉翁电子(TOTOLINK)公司的一款无线接入点。 TOTOLINK CA300-PoE 6.2c.884版本存在命令注入漏洞,该漏洞源于文件upgrade.so对参数FileName处理不当,可能导致os命令注入攻击。
CVSS Information
N/A
Vulnerability Type
N/A