CVE-2024-42967

Incorrect access control in TOTOLINK LR350 V9.3.5u.6369_B20220309 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*
cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*

History

16 Aug 2024, 13:34

Type Values Removed Values Added
CPE cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*
cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Totolink
Totolink lr350 Firmware
Totolink lr350
References () https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/LR350/ExportSettings.md - () https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/LR350/ExportSettings.md - Exploit, Third Party Advisory

15 Aug 2024, 17:34

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-15 17:15

Updated : 2025-03-13 16:15


NVD link : CVE-2024-42967

Mitre link : CVE-2024-42967


JSON object : View

Products Affected

totolink

  • lr350
  • lr350_firmware