A vulnerability classified as critical was found in Totolink N200RE 9.3.5u.6139_B20201216. Affected by this vulnerability is the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ePort leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
                
            References
                    | Link | Resource | 
|---|---|
| https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setIpPortFilterRules-71c3f0a947e14b7f95fa19b7d6676994?pvs=4 | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.252271 | Third Party Advisory | 
| https://vuldb.com/?id.252271 | Third Party Advisory | 
| https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setIpPortFilterRules-71c3f0a947e14b7f95fa19b7d6676994?pvs=4 | Exploit Third Party Advisory | 
| https://vuldb.com/?ctiid.252271 | Third Party Advisory | 
| https://vuldb.com/?id.252271 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 08:49
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : 8.3 v3 : 7.2 | 
| References | () https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setIpPortFilterRules-71c3f0a947e14b7f95fa19b7d6676994?pvs=4 - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.252271 - Third Party Advisory | |
| References | () https://vuldb.com/?id.252271 - Third Party Advisory | 
01 Feb 2024, 04:17
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.8 | 
| References | () https://jylsec.notion.site/TOTOLINK-N200RE-has-stack-buffer-overflow-vulnerability-in-setIpPortFilterRules-71c3f0a947e14b7f95fa19b7d6676994?pvs=4 - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/?ctiid.252271 - Third Party Advisory | |
| References | () https://vuldb.com/?id.252271 - Third Party Advisory | |
| CPE | cpe:2.3:o:totolink:n200re_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:* cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:* | 
29 Jan 2024, 14:25
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-01-29 14:15
Updated : 2024-11-21 08:49
NVD link : CVE-2024-1002
Mitre link : CVE-2024-1002
CVE.ORG link : CVE-2024-1002
JSON object : View
Products Affected
                totolink
- n200re
- n200re_firmware
CWE
                
                    
                        
                        CWE-121
                        
            Stack-based Buffer Overflow
