Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pcwc-j2m8-3j5j

Опубликовано: 08 янв. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A vulnerability, which was classified as critical, was found in Totolink N350RT 9.3.5u.6139_B202012. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-249852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

A vulnerability, which was classified as critical, was found in Totolink N350RT 9.3.5u.6139_B202012. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-249852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

EPSS

Процентиль: 42%
0.00202
Низкий

7.2 High

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 7.2
nvd
около 2 лет назад

A vulnerability, which was classified as critical, was found in Totolink N350RT 9.3.5u.6139_B202012. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-249852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 7.2
fstec
около 2 лет назад

Уязвимость функции loginAuth (/cgi-bin/cstecgi.cgi) микропрограммного обеспечения маршрутизатора Totolink N350RT, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 42%
0.00202
Низкий

7.2 High

CVSS3

Дефекты

CWE-121