First published: Tue Jul 30 2024(Updated: )
A vulnerability, which was classified as critical, has been found in TOTOLINK A7000R 9.1.0u.6268_B20220504. This issue affects the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272783. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TOTOLINK A7000R firmware | =9.1.0u.6268_b20220504 | |
TOTOLINK A7000R firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7212 is classified as a critical vulnerability.
CVE-2024-7212 affects the loginauth function in the /cgi-bin/cstecgi.cgi file, leading to a buffer overflow.
TOTOLINK A7000R firmware version 9.1.0u.6268_B20220504 is vulnerable to CVE-2024-7212.
Mitigation for CVE-2024-7212 involves updating the firmware to a patched version provided by TOTOLINK.
Yes, CVE-2024-7212 allows for remote exploitation by manipulating the password argument.