First published: Wed Apr 14 2021(Updated: )
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "ip" parameter is directly passed to the attacker, allowing them to control the "ip" field to attack the OS.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink X5000r Firmware | =9.1.0u.6118_b20201102 | |
TOTOLINK X5000R | ||
Totolink A720r Firmware | =4.1.5cu.470_b20200911 | |
TOTOLINK A720R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27710 is a command injection vulnerability in the TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102 and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911.
Remote attackers can exploit CVE-2021-27710 by sending a modified HTTP request, allowing them to execute arbitrary OS commands.
The severity of CVE-2021-27710 is critical, with a severity value of 9.8.
TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102 and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 are affected by CVE-2021-27710.
To fix CVE-2021-27710, update the firmware of the TOTOLINK X5000R router to version 9.1.0u.6118_B20201102 or later, and update the firmware of the TOTOLINK A720R router to version 4.1.5cu.470_B20200911 or later.