First published: Thu Aug 15 2024(Updated: )
Incorrect access control in TOTOLINK N350RT V9.3.5u.6139_B20201216 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink N350rt Firmware | =9.3.5u.6139_b20201216 | |
TOTOLINK N350RT |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42966 is considered a high severity vulnerability due to its ability to expose sensitive configuration information.
To fix CVE-2024-42966, update the TOTOLINK N350RT firmware to a version that addresses this access control issue.
CVE-2024-42966 can expose the apmib configuration file, which contains critical information like usernames and passwords.
Users of the TOTOLINK N350RT running firmware version 9.3.5u.6139_B20201216 are affected by CVE-2024-42966.
Yes, CVE-2024-42966 can be exploited remotely via crafted requests to the affected device's CGI script.