CVE-2021-27710

Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system function with untrusted input. In the function, "ip" parameter is directly passed to the attacker, allowing them to control the "ip" field to attack the OS.
References
Link Resource
https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw Exploit Third Party Advisory
https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*
cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.470_b20200911:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:*

History

21 Apr 2021, 15:41

Type Values Removed Values Added
CPE cpe:2.3:o:totolink:a720r_firmware:4.1.5cu.470_b20200911:*:*:*:*:*:*:*
cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6118_b20201102:*:*:*:*:*:*:*
cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a720r:-:*:*:*:*:*:*:*
CWE CWE-78
References (MISC) https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A - (MISC) https://hackmd.io/KjXzQdjDRjOuRjoZZXQo_A - Exploit, Third Party Advisory
References (MISC) https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw - (MISC) https://hackmd.io/Hy3oVgtcQiuqAtv9FdylHw - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 10.0
v3 : 9.8

14 Apr 2021, 19:42

Type Values Removed Values Added
New CVE

Information

Published : 2021-04-14 18:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-27710

Mitre link : CVE-2021-27710

CVE.ORG link : CVE-2021-27710


JSON object : View

Products Affected

totolink

  • a720r
  • x5000r_firmware
  • x5000r
  • a720r_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')