CVE-2024-8577

A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setStaticDhcpRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*

History

09 Sep 2024, 18:51

Type Values Removed Values Added
First Time Totolink t10 Firmware
Totolink t8
Totolink t10
Totolink
Totolink t8 Firmware
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setStaticDhcpRules.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setStaticDhcpRules.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.276811 - () https://vuldb.com/?ctiid.276811 - Permissions Required
References () https://vuldb.com/?id.276811 - () https://vuldb.com/?id.276811 - Third Party Advisory
References () https://vuldb.com/?submit.401265 - () https://vuldb.com/?submit.401265 - Third Party Advisory
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
CPE cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10:-:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*

09 Sep 2024, 13:03

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad en TOTOLINK AC1200 T8 y AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. Se ha declarado como crítica. La función setStaticDhcpRules del archivo /cgi-bin/cstecgi.cgi se ve afectada por esta vulnerabilidad. La manipulación del argumento desc provoca un desbordamiento del búfer. El ataque se puede ejecutar de forma remota. El exploit se ha hecho público y puede utilizarse. Se contactó primeramente con el proveedor sobre esta revelación, pero no respondió de ninguna manera.

08 Sep 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-08 19:15

Updated : 2024-09-09 18:51


NVD link : CVE-2024-8577

Mitre link : CVE-2024-8577

CVE.ORG link : CVE-2024-8577


JSON object : View

Products Affected

totolink

  • t8_firmware
  • t10
  • t10_firmware
  • t8
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')