First published: Sun Jul 28 2024(Updated: )
A vulnerability was found in TOTOLINK A3100R 4.1.2cu.5050_B20200504. It has been declared as critical. This vulnerability affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component HTTP POST Request Handler. The manipulation of the argument telnet_enabled leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272572. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3100R Firmware | =4.1.2cu.5050_b20200504 | |
TOTOLink A3100R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7158 has been declared as critical.
To fix CVE-2024-7158, update the TOTOLINK A3100R firmware to a version that addresses this vulnerability.
CVE-2024-7158 affects the HTTP POST Request Handler in the function setTelnetCfg.
CVE-2024-7158 impacts the TOTOLINK A3100R running firmware version 4.1.2cu.5050_B20200504.
CVE-2024-7158 is a critical vulnerability that allows manipulation of the telnet_enabled argument.