{ "Name": "TOTOLINK routers remote command injection vulnerabilities (CVE-2020-25499)", "Description": "TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.", "Product": "Totolink-A3002RU", "Homepage": "https://www.totolink.net", "DisclosureDate": "2020-12-09", "Author": "go0p", "FofaQuery": "(body=\"/boafrm/formLogin\" && body=\"dw(password_warning)\") || app=\"TOTO_LINK-WIRELESS-ROUTER\" || app=\"MikroTik-Router\"", "GobyQuery": "", "Level": "3", "Impact": "", "Recommendation": "Users can refer to the security bulletins provided by the following vendors to obtain patch information: https://www.totolink.net/home/index/newsss/id/", "Translation": { "CN": { "Description": "Totolink TOTOLINK A3002RU是中国台湾吉翁电子(Totolink)公司的一款无线路由器产品。 TOTOLINK A3002RU-V2.0.0 B20190814.1034 存在命令注入漏洞,该漏洞允许通过身份验证的远程用户修改系统的“运行命令”。攻击者可利用该漏洞可以使用此功能在路由器上执行任意OS命令。", "Impact": "Impact", "Name": "Totolink TOTOLINK A3002RU命令注入漏洞(CNVD-2020-70958)", "Product": "Totolink TOTOLINK A3002RU", "Recommendation": "厂商已发布了漏洞修复程序,请及时关注更新: https://www.totolink.net/home/index/newsss/id/196.html" } }, "References": null, "RealReferences": [ "https://github.com/kdoos/Vulnerabilities/blob/main/RCE_TOTOLINK-A3002RU-V2", "https://www.totolink.net/home/index/newsss/id/196.html", "https://nvd.nist.gov/vuln/detail/CVE-2020-25499", "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25499" ], "HasExp": true, "ExpParams": [ { "name": "cmd", "type": "input", "value": "/bin/busybox ifconfig" } ], "ExpTips": { "Type": "", "Content": "" }, "ScanSteps": null, "ExploitSteps": null, "Tags": null, "CVEIDs": [ "CVE-2020-25499" ], "CVSSScore": "8.8", "CNVDIDs": [ "CNVD-2020-70958" ], "CNNVDIDs": null, "AttackSurfaces": { "Application": null, "Support": null, "Service": null, "System": null, "Hardware": null }, "Disable": false }