Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "ip" parameter is directly passed to the attacker, allowing them to control the "ip" field to attack the OS.
References
Link | Resource |
---|---|
https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw | Exploit Third Party Advisory |
https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A | Exploit Third Party Advisory |
https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw | Exploit Third Party Advisory |
https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw - Exploit, Third Party Advisory | |
References | () https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A - Exploit, Third Party Advisory |
Information
Published : 2021-04-14 18:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27710
Mitre link : CVE-2021-27710
CVE.ORG link : CVE-2021-27710
JSON object : View
Products Affected
totolink
- a720r
- a720r_firmware
- x5000r_firmware
- x5000r
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')