First published: Thu Aug 01 2024(Updated: )
A vulnerability was found in TOTOLINK N350RT 9.3.5u.6139_B20201216. It has been declared as critical. This vulnerability affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument week/sTime/eTime leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273256. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink N350rt Firmware | =9.3.5u.6139_b20201216 | |
TOTOLINK N350RT |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7333 is classified as critical due to its potential for causing buffer overflow vulnerabilities.
To mitigate CVE-2024-7333, users should update the TOTOLINK N350RT firmware to a patched version beyond 9.3.5u.6139_B20201216.
CVE-2024-7333 specifically affects the TOTOLINK N350RT with firmware version 9.3.5u.6139_B20201216.
The buffer overflow in CVE-2024-7333 is triggered by manipulating arguments in the setParentalRules function within the cstecgi.cgi file.
Yes, CVE-2024-7333 can potentially be exploited remotely if the vulnerable firmware is not updated.