First published: Mon Jan 08 2024(Updated: )
A vulnerability, which was classified as critical, was found in Totolink N350RT 9.3.5u.6139_B202012. Affected is the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to stack-based buffer overflow. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-249852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink N350RT Firmware | =9.3.5u.6139_b20201216 | |
Totolink N350RT Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7218 has been classified as a critical vulnerability.
CVE-2023-7218 affects the loginAuth function in the /cgi-bin/cstecgi.cgi file, enabling a stack-based buffer overflow.
To fix CVE-2023-7218, update the Totolink N350RT firmware to a version that addresses this vulnerability.
CVE-2023-7218 could allow an attacker to execute arbitrary code on the affected device.
The vulnerable firmware version for CVE-2023-7218 is 9.3.5u.6139_B202012.