Access Control Flaw in TOTOLINK Router Models by TOTOLINK
CVE-2024-42967
9.8CRITICAL
Summary
An access control vulnerability exists in the TOTOLINK LR350 router, specifically in version V9.3.5u.6369_B20220309. The flaw allows attackers to craft a specific request to the '/cgi-bin/ExportSettings.sh' endpoint, which leads to unauthorized access to the APMIB configuration file. This file potentially exposes sensitive information, such as usernames and passwords, facilitating further exploitation of the device and its network. Remediation measures are crucial for users to protect their devices from potential attacks.
References
EPSS Score
1% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Collectors
NVD DatabaseMitre Database