Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-41319 PoC — TOTOLINK A6000R 安全漏洞

Source
Associated Vulnerability
Title:TOTOLINK A6000R 安全漏洞 (CVE-2024-41319)
Description:TOTOLINK A6000R是中国吉翁电子(TOTOLINK)公司的一款无线路由器。 TOTOLINK A6000R V1.0.1-B20201211.2000 版本存在安全漏洞,该漏洞源于通过 webcmd 函数中的 cmd 参数可以进行的命令注入。
Description
TOTOLINK A6000R 命令执行漏洞(CVE-2024-41319)
Readme
# TOTOLINK_poc
TOTOLINK A6000R 命令执行漏洞(CVE-2024-41319)  


 python TOTOLINK_poc.py -h  

                ) (`-.            ) (`-.
         ( OO ).           ( OO ).
        (_/.  \_)-. ,-.-')(_/.  \_)-. ,-.-')
         \  `.'  /  |  |OO)\  `.'  /  |  |OO)
          \     /\  |  |  \ \     /\  |  |  \
           \   \ |  |  |(_/  \   \ |  |  |(_/
          .'    \_),|  |_.' .'    \_),|  |_.'
         /  .'.  \(_|  |   /  .'.  \(_|  |
        '--'   '--' `--'  '--'   '--' `--'

usage: TOTOLINK_poc.py [-h] [-u URL] [-f FILE]  

TOTOLINK A6000R 命令执行漏洞  

optional arguments:  
  -h, --help            show this help message and exit  
  -u URL, --url URL     添加url信息  
  -f FILE, --file FILE  添加txt文件  

example:  
    python3 TOTOLINK_poc.py -u http://xxxx.xxxx.xxxx.xxxx  
    python3 TOTOLINK_poc.py -f x_url.txt  
File Snapshot

[4.0K] /data/pocs/1ed036f7ba1b435f89da1a2a9d0cb0f007522fc9 ├── [ 863] README.md └── [2.8K] TOTOLINK_poc.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.