First published: Mon Jul 29 2024(Updated: )
A vulnerability classified as critical has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. This affects the function setPortForwardRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument comment leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272601 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3600r Firmware | =4.1.2cu.5182_b20201102 | |
TOTOLink A3600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7180 is classified as a critical vulnerability.
To fix CVE-2024-7180, upgrade the TOTOLINK A3600R firmware to a patched version.
CVE-2024-7180 involves a buffer overflow in the setPortForwardRules function due to improper handling of the comment argument.
CVE-2024-7180 affects TOTOLINK A3600R with firmware version 4.1.2cu.5182_B20201102.
An attacker exploiting CVE-2024-7180 could potentially execute arbitrary code on the affected device.