{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0292","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-07T08:58:34.520Z","datePublished":"2024-01-08T02:00:05.783Z","dateUpdated":"2024-08-01T18:04:48.453Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-09T19:05:14.701Z"},"title":"Totolink LR1200GB cstecgi.cgi setOpModeCfg os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"CWE-78 OS Command Injection"}]}],"affected":[{"vendor":"Totolink","product":"LR1200GB","versions":[{"version":"9.1.0u.6619_B20230130","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected is the function setOpModeCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249858 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in Totolink LR1200GB 9.1.0u.6619_B20230130 entdeckt. Dabei betrifft es die Funktion setOpModeCfg der Datei /cgi-bin/cstecgi.cgi. Durch Manipulation des Arguments hostName mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-01-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-07T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-01-07T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-01-25T08:22:57.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jylsec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.249858","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.249858","tags":["signature","permissions-required"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setOpModeCfg/README.md","tags":["broken-link","exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-29T15:59:24.501098Z","id":"CVE-2024-0292","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-29T16:58:56.244Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:04:48.453Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.249858","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.249858","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setOpModeCfg/README.md","tags":["broken-link","exploit","x_transferred"]}]}]}}