Buffer Overflow Vulnerability in EX200 Could Lead to Remote Execution
CVE-2024-7335

8.8HIGH

Key Information:

Vendor
Totolink
Status
Vendor
CVE Published:
1 August 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

A vulnerability exists in the TOTOLINK EX200 version 4.0.3c.7646_B20201211 within the getSaveConfig function located in /cgi-bin/cstecgi.cgi?action=save&setting. The vulnerability arises from improper handling of the argument http_host, which could result in a buffer overflow, allowing an attacker to exploit this remotely. The details of this vulnerability have been publicly disclosed, raising concerns about its potential exploitation. The vendor has not provided any response to prior disclosures regarding this issue.

Affected Version(s)

EX200 4.0.3c.7646_B20201211

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

yhryhryhr_tu (VulDB User)
.