| タイトル | Totolink N200RE_V5 V9.3.5u.6255_B20211224 Broken Access Control |
|---|
| 説明 | V9.3.5u.6255_B20211224 of the device allows remote attackers to obtain Wi-Fi system information and modify system-related settings without logging in via port 80, path /cgi-bin/cstecgi.cgi, parameter topicurl.
This version does not verify that the administrator is logged in, so the attacker does not need to bring in the cookie obtained after the administrator has logged in, and can directly obtain the Wi-Fi SSID and Wi-Fi password.
Sending a request to modify the system settings without bringing in any cookies can modify the system settings, in a normal and secure situation it must be verified that the cookies are brought in after the administrator has logged in.
Totolink says the vulnerability has been fully patched and the latest patched version is available for download at https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/204/ids/36.html
Note: This vulnerability is the same as CVE-2023-7223, but in a different device and version. |
|---|
| ソース | ⚠️ https://drive.google.com/file/d/1R5AbCphHfqwqxflGwGGnHxICkId8oVoq/view?usp=sharing |
|---|
| ユーザー | lin7lic (UID 39301) |
|---|
| 送信 | 2024年01月08日 02:35 (2 年 ago) |
|---|
| モデレーション | 2024年01月16日 07:54 (8 days later) |
|---|
| ステータス | 重複 |
|---|
| VulDBエントリ | 250228 [Totolink N200RE v5 9.3.5u.6255_B20211224 Wi-Fi Information 特権昇格] |
|---|
| ポイント | 0 |
|---|