Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "command" parameter is directly passed to the attacker, allowing them to control the "command" field to attack the OS.
References
Link Resource
https://hackmd.io/7FtB06f-SJ-SCfkMYcXYxA Exploit Third Party Advisory
https://hackmd.io/mDgIBvoxSPCZrZiZjfQGhw Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-04-14T15:01:49

Updated: 2021-04-14T17:05:52

Reserved: 2021-02-25T00:00:00


Link: CVE-2021-27708

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-04-14T16:15:14.127

Modified: 2021-04-21T15:38:06.540


Link: CVE-2021-27708

JSON object: View

cve-icon Redhat Information

No data.

CWE