Goby/json/TOTOLINK-routers-remote-com...

60 lines
2.3 KiB
JSON
Raw Normal View History

2022-11-25 02:08:58 -08:00
{
"Name": "TOTOLINK routers remote command injection vulnerabilities (CVE-2020-25499)",
"Description": "TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.",
"Product": "Totolink-A3002RU",
"Homepage": "https://www.totolink.net",
"DisclosureDate": "2020-12-09",
"Author": "go0p",
"FofaQuery": "(body=\"/boafrm/formLogin\" && body=\"dw(password_warning)\") || app=\"TOTO_LINK-WIRELESS-ROUTER\" || app=\"MikroTik-Router\"",
"GobyQuery": "",
"Level": "3",
"Impact": "",
"Recommendation": "Users can refer to the security bulletins provided by the following vendors to obtain patch information: https://www.totolink.net/home/index/newsss/id/",
"Translation": {
"CN": {
"Description": "Totolink TOTOLINK A3002RU是中国台湾吉翁电子Totolink公司的一款无线路由器产品。 TOTOLINK A3002RU-V2.0.0 B20190814.1034 存在命令注入漏洞该漏洞允许通过身份验证的远程用户修改系统的“运行命令”。攻击者可利用该漏洞可以使用此功能在路由器上执行任意OS命令。",
"Impact": "Impact",
"Name": "Totolink TOTOLINK A3002RU命令注入漏洞CNVD-2020-70958",
"Product": "Totolink TOTOLINK A3002RU",
"Recommendation": "厂商已发布了漏洞修复程序,请及时关注更新: https://www.totolink.net/home/index/newsss/id/196.html"
}
},
"References": null,
"RealReferences": [
"https://github.com/kdoos/Vulnerabilities/blob/main/RCE_TOTOLINK-A3002RU-V2",
"https://www.totolink.net/home/index/newsss/id/196.html",
"https://nvd.nist.gov/vuln/detail/CVE-2020-25499",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25499"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "/bin/busybox ifconfig"
}
],
"ExpTips": {
"Type": "",
"Content": ""
},
"ScanSteps": null,
"ExploitSteps": null,
"Tags": null,
"CVEIDs": [
"CVE-2020-25499"
],
"CVSSScore": "8.8",
"CNVDIDs": [
"CNVD-2020-70958"
],
"CNNVDIDs": null,
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"Disable": false
}