An issue was discovered on TOTOLINK A850R-V1 through 1.0.1-B20150707.1612 and F1-V2 through 1.1-B20150708.1646 devices. By sending a specific hel,xasf packet to the WAN interface, it is possible to open the web management interface on the WAN interface.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2015-07-16-backdoor-and-RCE-found-in-8-TOTOLINK-products.html | Exploit Third Party Advisory |
https://pierrekim.github.io/blog/2015-07-16-backdoor-and-RCE-found-in-8-TOTOLINK-products.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2020-11-24 21:15
Updated : 2024-11-21 02:40
NVD link : CVE-2015-9550
Mitre link : CVE-2015-9550
CVE.ORG link : CVE-2015-9550
JSON object : View
Products Affected
totolink
- a850r-v1_firmware
- f2-v1_firmware
- a850r-v1
- n151rt-v2_firmware
- n300rh-v3
- f1-v2_firmware
- n300rh-v3_firmware
- n151rt-v2
- n300rt-v2
- f1-v2
- n300rt-v2_firmware
- n150rt-v2_firmware
- f2-v1
- n300rh-v2_firmware
- n300rh-v2
- n150rt-v2
CWE
CWE-668
Exposure of Resource to Wrong Sphere