First published: Sun Jul 28 2024(Updated: )
A vulnerability, which was classified as problematic, was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is an unknown function of the file /wizard.html of the component Password Reset Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272568. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3700r Firmware | =9.1.2u.5822_b20200513 | |
TOTOLINK A3700R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7154 is classified as problematic due to improper access controls.
To fix CVE-2024-7154, update the TOTOLINK A3700R firmware to the latest version that addresses this vulnerability.
CVE-2024-7154 affects the Password Reset Handler of the /wizard.html file in the TOTOLINK A3700R.
Yes, CVE-2024-7154 can be exploited remotely due to the improper access control mechanism.
The vulnerable version of TOTOLINK A3700R impacted by CVE-2024-7154 is 9.1.2u.5822_B20200513.