A vulnerability, which was classified as critical, has been found in TOTOLINK X15 1.0.0-B20230714.1105. Affected by this issue is the function formMapReboot of the file /boafrm/formMapReboot. The manipulation of the argument deviceMacAddr leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://vuldb.com/?id.310916 | vdb entry technical description third party advisory |
https://vuldb.com/?ctiid.310916 | vdb entry permissions required signature |
https://vuldb.com/?submit.583562 | third party advisory vdb entry |
https://github.com/Yhuanhuan01/TOTOlink/blob/main/TOTOlink-x15.md#poc1-code-injection | exploit |
https://www.totolink.net/ | product |