CVE-2021-43711

The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*
cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () https://github.com/doudoudedi/ToTolink_EX200_Cmmand_Execute/blob/main/ToTolink%20EX200%20Comand%20Injection2.md - Exploit, Third Party Advisory () https://github.com/doudoudedi/ToTolink_EX200_Cmmand_Execute/blob/main/ToTolink%20EX200%20Comand%20Injection2.md - Exploit, Third Party Advisory

Information

Published : 2022-01-04 14:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43711

Mitre link : CVE-2021-43711

CVE.ORG link : CVE-2021-43711


JSON object : View

Products Affected

totolink

  • ex200_firmware
  • ex200
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')