Totolink LR1200GB 9.1.0u.6619_B20230130 /cgi-bin/cstecgi.cgi setLanguageCfg lang تلف الذاكرة

تم أكتشاف ثغرة أمنية في Totolink LR1200GB 9.1.0u.6619_B20230130. وقد تم تصنيفها على أنها خطيرة. الثغرة الأمنية أثرت على الدالة setLanguageCfg من الملف /cgi-bin/cstecgi.cgi. تعريف الـ سي دبليو أي للثغرة الأمنية هو CWE-121. المشكلة تم الإبلاغ عنها بتاريخ 16/01/2024. يمكن عرض الاستشارة من هنا github.com. الثغرة الأمنية هذه تم تسميتهاCVE-2024-0577. يمكن شن الهجمة الإلكترونية هذه عن بعد. التفاصيل التقنية متوفرة. هنالك إكسبلويت متوفرة. تم الإبلاغ عن ال إكسبلويت ويمكن استخدامها. سعر ال إكسبلويت هذه يتراوح بحوالي تقريباًUSD $0-$5k في هذه اللحظة. تم أعتبراها على أنها proof-of-concept. تستطيع تحميل الإكسبلويت من هنا github.com. لكونها ثغرة هجوم فوري متوسط سعرها كان$0-$5k.

مجال16/01/2024 08:1103/02/2024 19:1003/02/2024 19:17
vendorTotolinkTotolinkTotolink
nameLR1200GBLR1200GBLR1200GB
version9.1.0u.6619_B202301309.1.0u.6619_B202301309.1.0u.6619_B20230130
file/cgi-bin/cstecgi.cgi/cgi-bin/cstecgi.cgi/cgi-bin/cstecgi.cgi
functionsetLanguageCfgsetLanguageCfgsetLanguageCfg
argumentlanglanglang
cwe121 (تلف الذاكرة)121 (تلف الذاكرة)121 (تلف الذاكرة)
risk222
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiNNN
cvss3_vuldb_sUUU
cvss3_vuldb_cHHH
cvss3_vuldb_iHHH
cvss3_vuldb_aHHH
cvss3_vuldb_ePPP
cvss3_vuldb_rcRRR
urlhttps://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/7/README.mdhttps://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/7/README.mdhttps://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/7/README.md
availability111
publicity111
urlhttps://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/7/README.mdhttps://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/7/README.mdhttps://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/7/README.md
cveCVE-2024-0577CVE-2024-0577CVE-2024-0577
responsibleVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
date1705359600 (16/01/2024)1705359600 (16/01/2024)1705359600 (16/01/2024)
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciCCC
cvss2_vuldb_iiCCC
cvss2_vuldb_aiCCC
cvss2_vuldb_ePOCPOCPOC
cvss2_vuldb_rcURURUR
cvss2_vuldb_auSSS
cvss2_vuldb_rlNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_rlXXX
cvss2_vuldb_basescore9.09.09.0
cvss2_vuldb_tempscore7.77.77.7
cvss3_vuldb_basescore8.88.88.8
cvss3_vuldb_tempscore8.08.08.0
cvss3_meta_basescore8.88.89.1
cvss3_meta_tempscore8.08.08.9
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1705359600 (16/01/2024)1705359600 (16/01/2024)
cve_nvd_summaryA vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250793 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250793 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiN
cvss3_nvd_sU
cvss3_nvd_cH
cvss3_nvd_iH
cvss3_nvd_aH
cvss2_nvd_avN
cvss2_nvd_acL
cvss2_nvd_auS
cvss2_nvd_ciC
cvss2_nvd_iiC
cvss2_nvd_aiC
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cH
cvss3_cna_iH
cvss3_cna_aH
cve_cnaVulDB
cvss2_nvd_basescore9.0
cvss3_nvd_basescore9.8
cvss3_cna_basescore8.8

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!