Home

Description

EN DE

A vulnerability has been found in TOTOLINK N350R 1.2.3-B20130826. This vulnerability affects unknown code of the file /boafrm/formSysCmd. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Es geht um eine nicht näher bekannte Funktion der Datei /boafrm/formSysCmd. Durch das Beeinflussen mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-08-13 | Published 2025-08-14 | Updated 2025-08-15 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Command Injection

Injection

Product status

1.2.3-B20130826
affected

Timeline

2025-08-13:Advisory disclosed
2025-08-13:VulDB entry created
2025-08-13:VulDB entry last update

Credits

rew1X (VulDB User) reporter

References

vuldb.com/?id.319900 (VDB-319900 | TOTOLINK N350R formSysCmd command injection) vdb-entry

vuldb.com/?ctiid.319900 (VDB-319900 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.631826 (Submit #631826 | TOTOLINK N350R V1.2.3-B20130826 Command Injection) third-party-advisory

vuldb.com/?submit.631838 (Submit #631838 | TOTOLINK N350R V1.2.3-B20130826 Command Injection (Duplicate)) third-party-advisory

github.com/rew1X/CVE/blob/main/TOTOLINK/N350R_formSysCmd.pdf related

github.com/...VE/blob/main/TOTOLINK/formSysCmd/formSysCmd.md exploit

www.totolink.net/ product

cve.org (CVE-2025-8937)

nvd.nist.gov (CVE-2025-8937)

Download JSON