Totolink N350RT HTTP POST Request stack-based overflow
CVE-2023-7187
8.8HIGH
Summary
A stack-based buffer overflow vulnerability has been identified in the Totolink N350RT router, specifically in the HTTP POST request handler found in the file /cgi-bin/cstecgi.cgi?action=login&flag=ie8. This flaw can be exploited through improper processing of certain requests, potentially allowing attackers to execute arbitrary code or crash the device. Public disclosure of the exploit method raises concerns regarding its accessibility and potential threat to network security. The vendor has been notified about this issue, but has not yet responded.
Affected Version(s)
N350RT 9.3.5u.6139_B20201216
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
jylsec (VulDB User)