Vulnerability Description
A vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_B20191024. Affected is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag with the input ie8 leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248268. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | A7100Ru Firmware | 7.4cu.2313_b20191024 |
| Totolink | A7100Ru | - |
Related Weaknesses (CWE)
References
- https://github.com/unpWn4bL3/iot-security/blob/main/1.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.248268Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.248268Third Party Advisory
- https://github.com/unpWn4bL3/iot-security/blob/main/1.mdExploitThird Party Advisory
- https://vuldb.com/?ctiid.248268Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.248268Third Party Advisory
FAQ
What is CVE-2023-6906?
CVE-2023-6906 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_B20191024. Affected is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP...
How severe is CVE-2023-6906?
CVE-2023-6906 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-6906?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink A7100Ru Firmware, Totolink A7100Ru.