First published: Tue Nov 27 2018(Updated: )
System command injection in fromNtp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ntpServerIp2" POST parameter. Certain payloads cause the device to become permanently inoperable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002ru Firmware | =1.0.8 | |
TOTOLINK A3002RU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-13307 is critical with a CVSS score of 9.8.
The vulnerability in TOTOLINK A3002RU version 1.0.8 is a system command injection in the "fromNtp" function.
Attackers can exploit CVE-2018-13307 by sending malicious payloads through the "ntpServerIp2" POST parameter, allowing them to execute system commands and potentially making the device permanently inoperable.
Yes, TOTOLINK A3002RU version 1.0.8 is vulnerable to CVE-2018-13307.
To fix CVE-2018-13307, it is recommended to update TOTOLINK A3002RU firmware to a version that includes a patch for this vulnerability.