First published: Tue Jul 30 2024(Updated: )
A vulnerability, which was classified as critical, was found in TOTOLINK A7000R 9.1.0u.6268_B20220504. Affected is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272784. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
TOTOLINK A7000R firmware | =9.1.0u.6268_b20220504 | |
TOTOLINK A7000R firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7213 is classified as a critical vulnerability.
To fix CVE-2024-7213, update the TOTOLINK A7000R firmware to a version that addresses this buffer overflow issue.
The impact of CVE-2024-7213 includes the potential for remote attackers to exploit a buffer overflow vulnerability.
Version 9.1.0u.6268_B20220504 of the TOTOLINK A7000R is affected by CVE-2024-7213.
Yes, CVE-2024-7213 can be exploited remotely, allowing attackers to manipulate the argument ssid.