First published: Tue Jan 09 2024(Updated: )
A vulnerability was found in Totolink T6 4.1.9cu.5241_B20210923. It has been classified as critical. This affects the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument v41 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249855. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink T6 Firmware | =4.1.9cu.5241_b20210923 | |
TOTOLink T6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-7221 has been classified as critical due to its potential for exploitation.
To mitigate CVE-2023-7221, it is recommended to update the Totolink T6 firmware to a patched version.
CVE-2023-7221 affects the HTTP POST Request Handler in the Totolink T6 firmware.
CVE-2023-7221 is a buffer overflow vulnerability that can be triggered by manipulating the argument v41.
The vulnerable version is Totolink T6 firmware 4.1.9cu.5241_b20210923.