A vulnerability classified as critical was found in Totolink N350RT 9.3.5u.6139_B20201216. Affected by this vulnerability is the function main of the file /cgi-bin/cstecgi.cgi?action=login&flag=1 of the component HTTP POST Request Handler. The manipulation of the argument v33 leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249769 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/jylsec/vuldb/blob/main/TOTOLINK/N350RT/2/README.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.249769 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.249769 Permissions Required Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2024-01-07T19:00:05.222Z

Updated: 2024-02-13T07:29:55.559Z

Reserved: 2024-01-05T11:10:17.724Z


Link: CVE-2023-7213

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2024-01-07T19:15:08.230

Modified: 2024-05-17T02:34:18.533


Link: CVE-2023-7213

JSON object: View

cve-icon Redhat Information

No data.