First published: Mon Jul 29 2024(Updated: )
A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ipDoamin leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272596. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3600r Firmware | =4.1.2cu.5182_b20201102 | |
TOTOLink A3600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7175 is classified as a critical vulnerability.
To mitigate CVE-2024-7175, update the TOTOLINK A3600R firmware to a version that addresses this vulnerability.
Exploiting CVE-2024-7175 allows for OS command injection, which can lead to unauthorized command execution on the affected device.
CVE-2024-7175 specifically affects the TOTOLINK A3600R with firmware version 4.1.2cu.5182_B20201102.
If updating is not possible, consider isolating the affected device from sensitive networks to reduce the risk of exploitation.