A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It has been classified as critical. Affected is the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://vuldb.com/?id.276810 | Third Party Advisory |
https://vuldb.com/?ctiid.276810 | Permissions Required |
https://vuldb.com/?submit.401264 | Third Party Advisory |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setIpPortFilterRules.md | Exploit Third Party Advisory |
https://www.totolink.net/ | Product |
Configurations
History
09 Sep 2024, 18:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Totolink t10
Totolink t8 Totolink Totolink t8 Firmware Totolink t10 Firmware |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-120 | |
CPE | cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:* cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:* cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:* cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:* |
|
References | () https://vuldb.com/?ctiid.276810 - Permissions Required | |
References | () https://www.totolink.net/ - Product | |
References | () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setIpPortFilterRules.md - Exploit, Third Party Advisory | |
References | () https://vuldb.com/?submit.401264 - Third Party Advisory | |
References | () https://vuldb.com/?id.276810 - Third Party Advisory |
08 Sep 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-08 18:15
Updated : 2024-09-09 18:59
NVD link : CVE-2024-8576
Mitre link : CVE-2024-8576
JSON object : View
Products Affected
totolink
- t10_firmware
- t10
- t8
- t8_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')