The /goform/formJsonAjaxReq POST endpoint of Shenzhen...
Moderate severity
Unreviewed
Published
Aug 13, 2025
to the GitHub Advisory Database
Description
Published by the National Vulnerability Database
Aug 13, 2025
Published to the GitHub Advisory Database
Aug 13, 2025
The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.
References