Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m742-x7cw-3g4q

Опубликовано: 10 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.4
CVSS3: 8.8

Описание

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument device_name leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument device_name leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 35%
0.00141
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120

Связанные уязвимости

CVSS3: 8.8
nvd
11 дней назад

A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument device_name leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 35%
0.00141
Низкий

7.4 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-119
CWE-120