On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU up to and including 2.0.0, A702R up to and including 2.1.3, N301RT up to and including 2.1.6, N302R up to and including 3.4.0, N300RT up to and including 3.4.0, N200RE up to and including 4.0.0, N150RT up to and including 3.4.0, and N100RE up to and including 3.4.0.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
totolink a3002ru_firmware |
||
totolink a702r_firmware |
||
totolink n301rt_firmware |
||
totolink n302r_firmware |
||
totolink n300rt_firmware |
||
totolink n200re_firmware |
||
totolink n150rt_firmware |
||
totolink n100re_firmware |