First published: Mon Jul 29 2024(Updated: )
A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. Affected by this vulnerability is the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272605 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3600r Firmware | =4.1.2cu.5182_b20201102 | |
TOTOLink A3600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7184 is classified as a critical vulnerability.
CVE-2024-7184 affects the TOTOLINK A3600R running firmware version 4.1.2cu.5182_B20201102.
CVE-2024-7184 is a buffer overflow vulnerability caused by improper handling of the setUrlFilterRules function.
To mitigate CVE-2024-7184, update the firmware of the TOTOLINK A3600R to a version that addresses this vulnerability.
Exploitation of CVE-2024-7184 could allow an attacker to execute arbitrary code on the affected device.