[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-27315":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":38},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":35,"name":36,"published":37,"updated":27},27315,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},2,"Nuclei",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":27,"epss_score":27,"epss_percentile":27,"cve":27,"in_cisa_catalog":34,"date":27,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"critical","The risk exists that an attacker can use the vulnerability identified to perform further attacks on the server.","TOTOLink routers are vulnerable to unauthenticated remote command execution via the /boaform/formWsc endpoint. An attacker can inject OS commands through the localPin parameter.","We recommend reviewing the purpose of the application or the server and applying patches, if applicable.",[33],"https://github.com/fizz-is-on-the-way/Iot_vuls/blob/main/N150RT/RCE_formWsc/README.md",false,"NETSCAN-NUCLEI-VULNERABILITIES-TOTOLINK-BOAFORM-RCE","TOTOLink Router - Remote Command Execution","2025-06-20T00:00:00Z",["Island",39],{"key":40,"params":41,"result":43},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":42},"{\"text-color\":\"gray\"}",{"head":44},{}]