CVE-2024-42966

Incorrect access control in TOTOLINK N350RT V9.3.5u.6139_B20201216 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:n350rt_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n350rt:-:*:*:*:*:*:*:*

History

24 Oct 2024, 20:35

Type Values Removed Values Added
CWE CWE-284 CWE-863

19 Aug 2024, 19:35

Type Values Removed Values Added
CWE CWE-284

16 Aug 2024, 13:35

Type Values Removed Values Added
CPE cpe:2.3:o:totolink:n350rt_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*
cpe:2.3:h:totolink:n350rt:-:*:*:*:*:*:*:*
Summary
  • (es) El control de acceso incorrecto en TOTOLINK N350RT V9.3.5u.6139_B20201216 permite a los atacantes obtener el archivo de configuración apmib, que contiene el nombre de usuario y la contraseña, a través de una solicitud manipulada a /cgi-bin/ExportSettings.sh.
First Time Totolink
Totolink n350rt
Totolink n350rt Firmware
CWE NVD-CWE-noinfo
References () https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/N350R/ExportSettings.md - () https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/N350R/ExportSettings.md - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

15 Aug 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-15 17:15

Updated : 2024-10-24 20:35


NVD link : CVE-2024-42966

Mitre link : CVE-2024-42966

CVE.ORG link : CVE-2024-42966


JSON object : View

Products Affected

totolink

  • n350rt
  • n350rt_firmware
CWE
NVD-CWE-noinfo CWE-863

Incorrect Authorization