Impact
The vulnerability is a classic buffer overflow triggered by the "mac_address" argument to the setMacFilterRules function located in /cgi-bin/cstecgi.cgi. A malformed POST request can overwrite the stack, potentially leading to a crash or remote code execution. The flaw is identified as CWE-119 and CWE-120, indicating unsafe handling of untrusted input and lack of bounds checking.
Affected Systems
The affected device is Totolink N300RH running firmware version 3.2.4-B20220812. No other affected versions are listed in the current data.
Risk and Exploitability
With a CVSS score of 8.7, the vulnerability is considered high severity. The EPSS score is not available, but the exploit is publicly available, and the CVE notes that it may be launched remotely. The entry is not listed in the CISA KEV catalog. An attacker who can reach the device’s management interface can send a crafted POST request to /cgi-bin/cstecgi.cgi to trigger the buffer overflow; the attack requires no authentication or is inferred to be unauthenticated given the lack of mention of credentials.
OpenCVE Enrichment