TOTOLINK A3002R V4.0.0-B20230531.1404 is vulnerable to Command Injection in /bin/boa via bandstr.
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Link | Tags |
---|---|
https://github.com/regainer27/totolink_A3002R_remote_command_exec | third party advisory exploit |
https://gist.github.com/regainer27/0abf6f56eae3fa2826d2551e22c2ace3 | third party advisory exploit |