Impact
The vulnerability is a buffer overflow in the POST Request Handler of Totolink N300RH routers, specifically the setWanConfig function in /cgi-bin/cstecgi.cgi. Manipulating the priDns argument causes a buffer overflow that can allow an attacker to execute arbitrary code on the device, compromising its integrity and potentially affecting availability.
Affected Systems
Totolink N300RH routers running firmware 3.2.4-B20220812 are affected. The firmware identifies the vulnerable setWanConfig function and remote POST processing that handles the priDns parameter.
Risk and Exploitability
The CVSS score of 8.7 reflects a high severity condition. The EPSS score is not available, indicating that current data on exploitation probability is limited, but the public disclosure and remote nature of the attack vector keep the risk significant. The vulnerability is not listed in the CISA KEV catalog at this time.
OpenCVE Enrichment