An issue in TOTOLINK A3100R V4.1.2cu.5247_B20211129 allows a remote attacker to execute arbitrary code via the setWebWlanIdx of the file /lib/cste_modules/wireless.so.
References
| Link | Resource |
|---|---|
| https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/A3100R/1.md | Exploit Third Party Advisory |
| https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/A3100R/1.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-03-28 21:15
Updated : 2025-04-14 17:06
NVD link : CVE-2025-28256
Mitre link : CVE-2025-28256
CVE.ORG link : CVE-2025-28256
JSON object : View
Products Affected
totolink
- a3100r_firmware
- a3100r
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
