RSS   Vulnerabilities for 'A3002ru firmware'   RSS

2018-11-27
 
CVE-2018-13316

CWE-77
 

 
System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "subnet" POST parameter.

 
 
CVE-2018-13314

CWE-77
 

 
System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ipAddr" POST parameter.

 
 
CVE-2018-13307

CWE-77
 

 
System command injection in fromNtp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ntpServerIp2" POST parameter. Certain payloads cause the device to become permanently inoperable.

 
 
CVE-2018-13306

CWE-77
 

 
System command injection in formDlna in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ftpUser" POST parameter.

 
2018-11-26
 
CVE-2018-13317

CWE-79
 

 
Password disclosure in password.htm in TOTOLINK A3002RU version 1.0.8 allows attackers to obtain the plaintext password for the admin user by making a GET request for password.htm.

 
 
CVE-2018-13315

CWE-20
 

 
Incorrect access control in formPasswordSetup in TOTOLINK A3002RU version 1.0.8 allows attackers to change the admin user's password via an unauthenticated POST request.

 
 
CVE-2018-13312

CWE-79
 

 
Cross-site scripting in notice_gen.htm in TOTOLINK A3002RU version 1.0.8 allows attackers to execute arbitrary JavaScript by modifying the "Input your notice URL" field.

 
 
CVE-2018-13311

CWE-77
 

 
System command injection in formDlna in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "sambaUser" POST parameter.

 
 
CVE-2018-13310

CWE-79
 

 
Cross-site scripting in password.htm in TOTOLINK A3002RU version 1.0.8 allows attackers to execute arbitrary JavaScript via the user's username.

 
 
CVE-2018-13309

CWE-79
 

 
Cross-site scripting in password.htm in TOTOLINK A3002RU version 1.0.8 allows attackers to execute arbitrary JavaScript via the user's password.

 


Copyright 2019, cxsecurity.com

 

Back to Top