First published: Sun Jul 28 2024(Updated: )
A vulnerability was found in TOTOLINK A3100R 4.1.2cu.5050_B20200504. It has been classified as critical. This affects the function getSaveConfig of the file /cgi-bin/cstecgi.cgi?action=save&setting. The manipulation of the argument http_host leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272571. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3100R Firmware | =4.1.2cu.5050_b20200504 | |
TOTOLink A3100R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7157 is classified as a critical vulnerability.
CVE-2024-7157 affects the TOTOLINK A3100R router running firmware version 4.1.2cu.5050_B20200504.
CVE-2024-7157 exploits a buffer overflow vulnerability through the manipulation of the http_host argument in the getSaveConfig function.
To fix CVE-2024-7157, update the TOTOLINK A3100R firmware to a version that does not include this vulnerability.
The potential impact of CVE-2024-7157 includes remote code execution and unauthorized access to the affected router.