First published: Mon Dec 18 2023(Updated: )
A vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_B20191024. Affected is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag with the input ie8 leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248268. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TOTOLINK A7100RU | =7.4cu.2313_b20191024 | |
TOTOLINK A7100RU |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6906 is classified as a critical vulnerability.
To fix CVE-2023-6906, upgrade the Totolink A7100RU firmware to a version that patches this vulnerability.
CVE-2023-6906 affects the HTTP POST Request Handler in the Totolink A7100RU.
CVE-2023-6906 allows for unauthorized manipulation of the login function, potentially leading to account compromise.
The vulnerable firmware version of Totolink A7100RU is 7.4cu.2313_B20191024.