CVE-2020-25499

TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:totolink:a3002ru-v1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002ru-v1:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:totolink:a3002ru-v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002ru-v2:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:totolink:a702r-v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a702r-v2:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:totolink:a702r-v3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a702r-v3:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:totolink:n100re-v3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n100re-v3:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:totolink:n200re-v3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n200re-v3:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:totolink:n200re-v4_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n200re-v4:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:totolink:n210re_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n210re:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:totolink:n300rh-v3_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n300rh-v3:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:totolink:n302r_plus_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n302r_plus:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:18

Type Values Removed Values Added
References () https://github.com/kdoos/Vulnerabilities/blob/main/RCE_TOTOLINK-A3002RU-V2 - Exploit, Third Party Advisory () https://github.com/kdoos/Vulnerabilities/blob/main/RCE_TOTOLINK-A3002RU-V2 - Exploit, Third Party Advisory
References () https://www.totolink.net/home/index/newsss/id/196.html - Patch, Vendor Advisory () https://www.totolink.net/home/index/newsss/id/196.html - Patch, Vendor Advisory

Information

Published : 2020-12-09 21:15

Updated : 2024-11-21 05:18


NVD link : CVE-2020-25499

Mitre link : CVE-2020-25499

CVE.ORG link : CVE-2020-25499


JSON object : View

Products Affected

totolink

  • n100re-v3
  • a702r-v2
  • n150rt
  • a3002ru-v1
  • a702r-v3
  • a702r-v3_firmware
  • n200re-v4_firmware
  • n200re-v3_firmware
  • a3002ru-v2
  • n300rh-v3_firmware
  • n300rt
  • n302r_plus_firmware
  • a3002ru-v1_firmware
  • n100re-v3_firmware
  • a702r-v2_firmware
  • n200re-v4
  • n210re
  • n300rt_firmware
  • n300rh-v3
  • a3002r
  • a3002ru-v2_firmware
  • n200re-v3
  • n302r_plus
  • n150rt_firmware
  • a3002r_firmware
  • n210re_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-862

Missing Authorization