Vulnerability Description
System command injection in formDlna in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "sambaUser" POST parameter.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A3002Ru Firmware | 1.0.8 |
| Totolink | A3002Ru | - |
Related Weaknesses (CWE)
References
- https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f4Third Party Advisory
- https://blog.securityevaluators.com/new-vulnerabilities-in-totolink-a3002ru-d6f4Third Party Advisory
FAQ
What is CVE-2018-13311?
CVE-2018-13311 is a vulnerability with a CVSS score of 9.8 (CRITICAL). System command injection in formDlna in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "sambaUser" POST parameter.
How severe is CVE-2018-13311?
CVE-2018-13311 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-13311?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A3002Ru Firmware, Totolink A3002Ru.