CVE-2021-45733
https://notcve.org/view.php?id=CVE-2021-45733
04 Feb 2022 — TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a command injection vulnerability in the function NTPSyncWithHost. This vulnerability allows attackers to execute arbitrary commands via the parameter host_time. Se ha detectado que TOTOLINK X5000R versión v9.1.0u.6118_B20201102, contiene una vulnerabilidad de inyección de comandos en la función NTPSyncWithHost. Esta vulnerabilidad permite a atacantes ejecutar comandos arbitrarios por medio del parámetro host_time • https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_7/7.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2021-45734
https://notcve.org/view.php?id=CVE-2021-45734
04 Feb 2022 — TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a stack overflow in the function setUrlFilterRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via the url parameter. Se ha detectado que TOTOLINK X5000R versión v9.1.0u.6118_B20201102, contiene un desbordamiento de pila en la función setUrlFilterRules. Esta vulnerabilidad permite a atacantes causar una denegación de servicio (DoS) por medio del parámetro url • https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_10/10.md •
CVE-2021-45735
https://notcve.org/view.php?id=CVE-2021-45735
04 Feb 2022 — TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to use the HTTP protocol for authentication into the admin interface, allowing attackers to intercept user credentials via packet capture software. Se ha detectado que TOTOLINK X5000R versión v9.1.0u.6118_B20201102, usa el protocolo HTTP para la autenticación en la interfaz de administración, lo que permite a atacantes interceptar las credenciales de usuarios por medio de un software de captura de paquetes • https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_12/12.md • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2021-45736
https://notcve.org/view.php?id=CVE-2021-45736
04 Feb 2022 — TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a stack overflow in the function setL2tpServerCfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the eip, sip, server parameters. Se ha detectado que TOTOLINK X5000R versión v9.1.0u.6118_B20201102, contiene un desbordamiento de pila en la función setL2tpServerCfg. Esta vulnerabilidad permite a atacantes causar una denegación de servicio (DoS) por medio de los parámetros eip, sip, server • https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_9/9.md •
CVE-2021-45738
https://notcve.org/view.php?id=CVE-2021-45738
04 Feb 2022 — TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a command injection vulnerability in the function UploadFirmwareFile. This vulnerability allows attackers to execute arbitrary commands via the parameter FileName. Se ha detectado que TOTOLINK X5000R versión v9.1.0u.6118_B20201102, contiene una vulnerabilidad de inyección de comandos en la función UploadFirmwareFile. Esta vulnerabilidad permite a atacantes ejecutar comandos arbitrarios por medio del parámetro FileName • https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_8/8.md • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2021-45741
https://notcve.org/view.php?id=CVE-2021-45741
04 Feb 2022 — TOTOLINK X5000R v9.1.0u.6118_B20201102 was discovered to contain a stack overflow in the function setIpv6Cfg. This vulnerability allows attackers to cause a Denial of Service (DoS) via the relay6to4 parameters. Se ha detectado que TOTOLINK X5000R versión v9.1.0u.6118_B20201102, contiene un desbordamiento de pila en la función setIpv6Cfg. Esta vulnerabilidad permite a atacantes causar una denegación de servicio (DoS) por medio de los parámetros relay6to4 • https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_11/11.md •
CVE-2021-27710
https://notcve.org/view.php?id=CVE-2021-27710
14 Apr 2021 — Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "ip" parameter is directly passed to the attacker, allowing them to control the "ip" field to attack the OS. Una Inyección de Comandos en el enrutador TOTOLINK X5000R co... • https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2021-27708
https://notcve.org/view.php?id=CVE-2021-27708
14 Apr 2021 — Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "command" parameter is directly passed to the attacker, allowing them to control the "command" field to attack the OS. Una inyección de comandos en el enrutador TOTOLINK... • https://hackmd.io/7FtB06f-SJ-SCfkMYcXYxA • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •