First published: Thu Aug 15 2024(Updated: )
Incorrect access control in TOTOLINK LR350 V9.3.5u.6369_B20220309 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42967 is rated as a high severity vulnerability due to its potential to expose sensitive information.
To mitigate CVE-2024-42967, it is recommended to update the TOTOLINK LR350 firmware to a version that addresses the incorrect access control issue.
CVE-2024-42967 could expose the apmib configuration file, which contains sensitive user credentials such as usernames and passwords.
CVE-2024-42967 allows attackers to obtain sensitive configuration data through a crafted request to the device's export settings endpoint.
If you are using the TOTOLINK LR350 with firmware version 9.3.5u.6369_B20220309, your device is vulnerable to CVE-2024-42967.