CWE
78 862
Advisory Published
Updated

CVE-2020-25499: OS Command Injection

First published: Wed Dec 09 2020(Updated: )

TOTOLINK A3002RU-V2.0.0 B20190814.1034 allows authenticated remote users to modify the system's 'Run Command'. An attacker can use this functionality to execute arbitrary OS commands on the router.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Totolink A3002r Firmware<1.1.1-b20200824.0128
TOTOLINK A3002R
Totolink A3002ru-v1 Firmware<3.4.0-b20201030.1754
Totolink A3002ru-v1
Totolink A3002ru-v2 Firmware<2.1.1-b20200911.1756
TOTOLINK A3002RU-V2
Totolink A702r-v2 Firmware<1.0.0-b20201028.1743
Totolink A702r-v2
Totolink A702r-v3 Firmware<1.0.0-b20201103.1713
Totolink A702r-v3
Totolink N100re-v3 Firmware<3.4.0-b20201030.0926
Totolink N100re-v3
Totolink N150rt Firmware<3.4.0-b20201030.1142
Totolink N150rt
Totolink N200re-v3 Firmware<3.4.0-b20201029.1811
Totolink N200re-v3
Totolink N200re-v4 Firmware<4.0.0-b20200805.1507
Totolink N200re-v4
Totolink N210re Firmware<1.0.0-b20201030.2030
Totolink N210re
Totolink N300rh-v3 Firmware<3.2.4-b20201029.1838
Totolink N300rh-v3
Totolink N300rt Firmware<3.4.0-b20201026.2033
TOTOLINK N300RT
Totolink N302r Plus Firmware<3.4.0-b20201028.2224
Totolink N302r Plus

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203