![]() ![]() The identifier of this vulnerability is VDB-249864. The exploit has been disclosed to the public and may be used. It is possible to launch the attack remotely. The manipulation of the argument ip leads to os command injection. Affected is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. ![]() NOTE: The vendor was contacted early about this disclosure but did not respond in any way.Ī vulnerability was found in Totolink N200RE 9.3.5u.6139_B20201216. The identifier VDB-249865 was assigned to this vulnerability. ![]() The manipulation of the argument command leads to os command injection. Affected by this vulnerability is the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. Prior to commit db560de0b56476c87a2f967466407939196dd254, the /mehah/otclient "`Analysis - SonarCloud`" workflow is vulnerable to an expression injection in Actions, allowing an attacker to run commands remotely on the runner, leak secrets, and alter the repository using this workflow. OTCLient is an alternative tibia client for otserv. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |