Impact
An attacker can cause a buffer overflow by manipulating the Password parameter in the loginauth handler of /cgi-bin/cstecgi.cgi. The overflow is triggered remotely and can lead to arbitrary code execution on the device. This is a classic stack-based buffer overflow (CWE-120) and general buffer overflow (CWE-119). The impact is therefore loss of confidentiality, integrity, and availability of the affected device due to potential remote code execution.
Affected Systems
The flaw exists in Totolink N300RH routers running firmware 3.2.4-B20220812. The device model is an N300RH and the vulnerable component is the Parameter Handler within the "cgi-bin/cstecgi.cgi" script. Users running this specific firmware version are at risk.
Risk and Exploitability
The CVSS score is 9.3, indicating a critical severity. EPSS information is not available, but the vulnerability is publicly exploitable and the exploit has already been released, meaning a realistic exploitation window is high. The vulnerability is not yet listed in CISA’s KEV catalog. Attackers can reach the vulnerable endpoint over the network, likely via the device’s web management interface, and trigger the overflow without requiring local access.
OpenCVE Enrichment