{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0291","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-07T08:58:32.287Z","datePublished":"2024-01-08T01:00:05.126Z","dateUpdated":"2025-05-16T15:34:12.894Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-09T19:05:15.916Z"},"title":"Totolink LR1200GB cstecgi.cgi UploadFirmwareFile command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"CWE-77 Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"LR1200GB","versions":[{"version":"9.1.0u.6619_B20230130","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument FileName leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249857 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Totolink LR1200GB 9.1.0u.6619_B20230130 ausgemacht. Sie wurde als kritisch eingestuft. Dies betrifft die Funktion UploadFirmwareFile der Datei /cgi-bin/cstecgi.cgi. Durch die Manipulation des Arguments FileName mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-07T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-01-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-25T08:16:12.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jylsec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.249857","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.249857","tags":["signature","permissions-required"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/UploadFirmwareFile/README.md","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:04:48.449Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.249857","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.249857","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/UploadFirmwareFile/README.md","tags":["broken-link","exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-16T15:33:18.278177Z","id":"CVE-2024-0291","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-16T15:34:12.894Z"}}]}}