CVE-2024-7177

A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been classified as critical. Affected is the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument langType leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272598 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.272598 Permissions Required Third Party Advisory
https://vuldb.com/?id.272598 Third Party Advisory
https://vuldb.com/?submit.378044 Third Party Advisory
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.272598 Permissions Required Third Party Advisory
https://vuldb.com/?id.272598 Third Party Advisory
https://vuldb.com/?submit.378044 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*

History

21 Nov 2024, 09:51

Type Values Removed Values Added
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md - Exploit, Third Party Advisory () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.272598 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.272598 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.272598 - Third Party Advisory () https://vuldb.com/?id.272598 - Third Party Advisory
References () https://vuldb.com/?submit.378044 - Third Party Advisory () https://vuldb.com/?submit.378044 - Third Party Advisory

06 Aug 2024, 13:15

Type Values Removed Values Added
CPE cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3600r:-:*:*:*:*:*:*:*
CWE CWE-77
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setLanguageCfg.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.272598 - () https://vuldb.com/?ctiid.272598 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.272598 - () https://vuldb.com/?id.272598 - Third Party Advisory
References () https://vuldb.com/?submit.378044 - () https://vuldb.com/?submit.378044 - Third Party Advisory
First Time Totolink
Totolink a3600r
Totolink a3600r Firmware

29 Jul 2024, 14:12

Type Values Removed Values Added
Summary
  • (es) Se encontró una vulnerabilidad en TOTOLINK A3600R 4.1.2cu.5182_B20201102. Ha sido clasificada como crítica. La función setLanguageCfg del fichero /cgi-bin/cstecgi.cgi es afectada por la vulnerabilidad. La manipulación del argumento langType provoca un desbordamiento de búfer. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al público y puede utilizarse. VDB-272598 es el identificador asignado a esta vulnerabilidad. NOTA: Se contactó al proveedor tempranamente sobre esta divulgación, pero no respondió de ninguna manera.

29 Jul 2024, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 02:15

Updated : 2024-11-21 09:51


NVD link : CVE-2024-7177

Mitre link : CVE-2024-7177

CVE.ORG link : CVE-2024-7177


JSON object : View

Products Affected

totolink

  • a3600r
  • a3600r_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')