TOTOLINK.X18.disconnectVPN.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection vulnerability in the TOTOLINK X18 Wi-Fi router.
The vulnerability is caused by a lack of sanitation to arguments passed to the disconnectVPN function within cstecgi.cgi. An attacker can exploit this with a crafted request to execute arbitrary commands within the context of the system.
Affected Products
Totolink X18 version 9.1.0cu.2024_B20220329
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently, we are unaware of any vendor supplied patch or updates available for this issue.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2024-04-03 | 27.760 | Sig Added |
2024-03-26 | 27.755 | Status:disable:enable |
2024-03-19 | 27.751 | Name:Totolink. X18. disconnectVPN. Command. Injection:TOTOLINK. X18. disconnectVPN. Command. Injection |
2024-03-12 | 27.747 |