CVE-2024-8576

A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It has been classified as critical. Affected is the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*

History

09 Sep 2024, 18:59

Type Values Removed Values Added
CPE cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
First Time Totolink t8 Firmware
Totolink t10
Totolink
Totolink t8
Totolink t10 Firmware
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setIpPortFilterRules.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setIpPortFilterRules.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.276810 - () https://vuldb.com/?ctiid.276810 - Permissions Required
References () https://vuldb.com/?id.276810 - () https://vuldb.com/?id.276810 - Third Party Advisory
References () https://vuldb.com/?submit.401264 - () https://vuldb.com/?submit.401264 - Third Party Advisory
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product

09 Sep 2024, 13:03

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en TOTOLINK AC1200 T8 y AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. Se ha clasificado como crítica. La función setIpPortFilterRules del archivo /cgi-bin/cstecgi.cgi está afectada. La manipulación del argumento desc provoca un desbordamiento del búfer. Es posible lanzar el ataque de forma remota. El exploit se ha hecho público y puede utilizarse. Se contactó primeramente con el proveedor sobre esta revelación, pero no respondió de ninguna manera.

08 Sep 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-08 18:15

Updated : 2024-09-09 18:59


NVD link : CVE-2024-8576

Mitre link : CVE-2024-8576

CVE.ORG link : CVE-2024-8576


JSON object : View

Products Affected

totolink

  • t8_firmware
  • t8
  • t10_firmware
  • t10
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')