First published: Mon Jul 29 2024(Updated: )
A vulnerability was found in TOTOLINK A3600R 4.1.2cu.5182_B20201102. It has been declared as critical. This vulnerability affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272608. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3600r Firmware | =4.1.2cu.5182_b20201102 | |
TOTOLink A3600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7187 has been declared as critical due to its potential for remote exploitation.
To fix CVE-2024-7187, update the TOTOLINK A3600R firmware to the latest version available from the manufacturer.
CVE-2024-7187 affects the UploadCustomModule function in the /cgi-bin/cstecgi.cgi file of the TOTOLINK A3600R firmware version 4.1.2cu.5182_B20201102.
CVE-2024-7187 is a buffer overflow vulnerability that can be exploited by manipulating the File argument.
Users of the TOTOLINK A3600R router running firmware version 4.1.2cu.5182_B20201102 are affected by CVE-2024-7187.