A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been classified as critical. This affects the function setWiFiAclAddConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument comment leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272607. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Totolink
Totolink a3600r Totolink a3600r Firmware |
|
CPEs | cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:* |
|
Vendors & Products |
Totolink
Totolink a3600r Totolink a3600r Firmware |
MITRE
Status: PUBLISHED
Assigner: VulDB
Published: 2024-07-29T06:00:09.895Z
Updated: 2024-08-01T21:52:30.969Z
Reserved: 2024-07-28T05:35:37.042Z
Link: CVE-2024-7186
Vulnrichment
Updated: 2024-08-01T21:52:30.969Z
NVD
Status : Modified
Published: 2024-07-29T06:15:03.420
Modified: 2024-11-21T09:51:02.633
Link: CVE-2024-7186
Redhat
No data.