TOTOLINK EX1800T 9.1.0cu.2112_B20220316 /cgi-bin/cstecgi.cgi sub_40662C ssid मेमरी भ्रष्टाचार

एक दुर्बलता जी गंभीर म्हणून ओळखली गेली आहे, ती TOTOLINK EX1800T 9.1.0cu.2112_B20220316 मध्ये सापडली आहे. संबंधित आहे फंक्शन sub_40662C फाइल /cgi-bin/cstecgi.cgi च्या. सॉफ्टवेअरमध्ये ssid या आर्ग्युमेंटचे केलेले बदल मेमरी भ्रष्टाचार यास कारणीभूत ठरतात. CWE द्वारे समस्या जाहीर केल्यास CWE-121 येथे पोहोचता येते. ही दुर्बलता प्रकाशित झाली होती 08/12/2024. github.com या ठिकाणी सल्ला डाउनलोडसाठी उपलब्ध आहे. ही दुर्बलता CVE-2024-12352 म्हणून ओळखली जाते. हा हल्ला रिमोटली सुरू करता येऊ शकतो. तांत्रिक माहिती उपलब्ध आहे. यासाठी एक एक्स्प्लॉइट उपलब्ध आहे. शोषणाची माहिती सार्वजनिक करण्यात आली आहे आणि ते वापरले जाऊ शकते. आत्ताच्या क्षणी सुमारे USD $0-$5k असण्याची शक्यता आहे. याला प्रूफ-ऑफ-कॉन्सेप्ट असे घोषित करण्यात आले आहे. शोषण डाउनलोडसाठी github.com येथे शेअर केले आहे. 0-डे म्हणून त्याची अंदाजित काळ्या बाजारातील किंमत $0-$5k एवढी होती. Once again VulDB remains the best source for vulnerability data.

8 बदल · 126 डेटा पॉइंट्स

शेतअद्ययावत 3/7
09/12/2024 07:27 AM
अद्ययावत 4/7
10/12/2024 09:13 AM
अद्ययावत 5/7
11/12/2024 06:49 AM
अद्ययावत 6/7
23/12/2024 03:04 PM
अद्ययावत 7/7
23/12/2024 03:07 PM
software_vendorTOTOLINKTOTOLINKTOTOLINKTOTOLINKTOTOLINK
software_nameEX1800TEX1800TEX1800TEX1800TEX1800T
software_version9.1.0cu.2112_B202203169.1.0cu.2112_B202203169.1.0cu.2112_B202203169.1.0cu.2112_B202203169.1.0cu.2112_B20220316
software_file/cgi-bin/cstecgi.cgi/cgi-bin/cstecgi.cgi/cgi-bin/cstecgi.cgi/cgi-bin/cstecgi.cgi/cgi-bin/cstecgi.cgi
software_functionsub_40662Csub_40662Csub_40662Csub_40662Csub_40662C
software_argumentssidssidssidssidssid
vulnerability_cweCWE-121 (मेमरी भ्रष्टाचार)CWE-121 (मेमरी भ्रष्टाचार)CWE-121 (मेमरी भ्रष्टाचार)CWE-121 (मेमरी भ्रष्टाचार)CWE-121 (मेमरी भ्रष्टाचार)
vulnerability_risk22222
cvss3_vuldb_avNNNNN
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.md
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.mdhttps://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.md
source_cveCVE-2024-12352CVE-2024-12352CVE-2024-12352CVE-2024-12352CVE-2024-12352
cna_responsibleVulDBVulDBVulDBVulDBVulDB
cvss2_vuldb_avNNNNN
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avNNNNN
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore4.04.04.04.04.0
cvss2_vuldb_tempscore3.43.43.43.43.4
cvss3_vuldb_basescore4.34.34.34.34.3
cvss3_vuldb_tempscore3.93.93.93.93.9
cvss3_meta_basescore6.26.27.17.17.1
cvss3_meta_tempscore5.95.96.96.96.8
cvss4_vuldb_bscore5.35.35.35.35.3
cvss4_vuldb_btscore2.12.12.12.12.1
advisory_date1733612400 (08/12/2024)1733612400 (08/12/2024)1733612400 (08/12/2024)1733612400 (08/12/2024)1733612400 (08/12/2024)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avNNNNN
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prLLLLL
cvss4_cna_uiNNNNN
cvss4_cna_vcNNNNN
cvss4_cna_viNNNNN
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore5.35.35.35.35.3
cvss3_cna_avNNNNN
cvss3_cna_acLLLLL
cvss3_cna_prLLLLL
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cNNNNN
cvss3_cna_iNNNNN
cvss3_cna_aLLLLL
cvss3_cna_basescore4.34.34.34.34.3
cvss2_cna_avNNNNN
cvss2_cna_acLLLLL
cvss2_cna_auSSSSS
cvss2_cna_ciNNNNN
cvss2_cna_iiNNNNN
cvss2_cna_aiPPPPP
cvss2_cna_basescore44444
cvss3_researcher_avNNNNN
cvss3_researcher_rlWWWWW
cvss3_researcher_acLLLLL
cvss3_researcher_uiNNNNN
cvss2_researcher_eFFFFF
cvss3_researcher_rcCCCCC
cvss2_researcher_avNNNNN
cvss2_researcher_auNNNNN
cvss3_researcher_prNNNNN
cvss2_researcher_acLLLLL
cvss3_researcher_aHHHHH
cvss2_researcher_rlWWWWW
cvss3_researcher_cHHHHH
cvss2_researcher_rcCCCCC
cvss2_researcher_iiCCCCC
cvss3_researcher_sCCCCC
cvss2_researcher_ciCCCCC
cvss2_researcher_aiCCCCC
cvss3_researcher_iHHHHH
cvss3_researcher_eFFFPP
cvss2_researcher_basescore10.010.010.010.010.0
cvss3_researcher_basescore10.010.010.010.010.0
exploit_languagePHPPHPPHPPHP
cve_nvd_summaryesSe ha encontrado una vulnerabilidad clasificada como problemática en TOTOLINK EX1800T 9.1.0cu.2112_B20220316. Esta vulnerabilidad afecta a la función sub_40662C del archivo /cgi-bin/cstecgi.cgi. La manipulación del argumento ssid provoca un desbordamiento de búfer en la región stack de la memoria . El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse.Se ha encontrado una vulnerabilidad clasificada como problemática en TOTOLINK EX1800T 9.1.0cu.2112_B20220316. Esta vulnerabilidad afecta a la función sub_40662C del archivo /cgi-bin/cstecgi.cgi. La manipulación del argumento ssid provoca un desbordamiento de búfer en la región stack de la memoria . El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse.Se ha encontrado una vulnerabilidad clasificada como problemática en TOTOLINK EX1800T 9.1.0cu.2112_B20220316. Esta vulnerabilidad afecta a la función sub_40662C del archivo /cgi-bin/cstecgi.cgi. La manipulación del argumento ssid provoca un desbordamiento de búfer en la región stack de la memoria . El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al público y puede utilizarse.
cvss3_nvd_avNNN
cvss3_nvd_acLLL
cvss3_nvd_prNNN
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cHHH
cvss3_nvd_iHHH
cvss3_nvd_aHHH
cvss3_nvd_basescore9.89.89.8
vulnerability_historic00

Do you want to use VulDB in your project?

Use the official API to access entries easily!