First published: Tue Nov 27 2018(Updated: )
System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "subnet" POST parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3002ru Firmware | =1.0.8 | |
TOTOLINK A3002RU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13316 is a vulnerability in the TOTOLINK A3002RU router that allows attackers to execute system commands.
CVE-2018-13316 has a severity rating of 9.8, which is considered critical.
Attackers can exploit CVE-2018-13316 by sending a malicious payload through the POST parameter 'subnet' in the formAliasIp function of the router.
TOTOLINK A3002RU version 1.0.8 is affected by CVE-2018-13316.
To protect your TOTOLINK A3002RU router from CVE-2018-13316, update the firmware to a version that is not vulnerable.