First published: Wed Apr 14 2021(Updated: )
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "command" parameter is directly passed to the attacker, allowing them to control the "command" field to attack the OS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink X5000r Firmware | =9.1.0u.6118_b20201102 | |
TOTOLINK X5000R | ||
Totolink A720r Firmware | =4.1.5cu.470_b20200911 | |
TOTOLINK A720R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27708 is a command injection vulnerability in the TOTOLINK X5000R and A720R routers.
CVE-2021-27708 allows remote attackers to execute arbitrary OS commands on the TOTOLINK X5000R and A720R routers.
CVE-2021-27708 has a severity rating of 9.8 (critical).
The TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102 and the TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 are affected by CVE-2021-27708.
To fix CVE-2021-27708, it is recommended to update the firmware of the TOTOLINK X5000R and A720R routers to a patched version provided by the manufacturer.