{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0575","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-01-16T07:06:23.789Z","datePublished":"2024-01-16T15:00:07.449Z","dateUpdated":"2024-09-10T18:24:14.242Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-09T19:11:59.986Z"},"title":"Totolink LR1200GB cstecgi.cgi setTracerouteCfg stack-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-121","lang":"en","description":"CWE-121 Stack-based Buffer Overflow"}]}],"affected":[{"vendor":"Totolink","product":"LR1200GB","versions":[{"version":"9.1.0u.6619_B20230130","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been classified as critical. This affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250791. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in Totolink LR1200GB 9.1.0u.6619_B20230130 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion setTracerouteCfg der Datei /cgi-bin/cstecgi.cgi. Mit der Manipulation des Arguments command mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}}],"timeline":[{"time":"2024-01-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-01-16T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2024-01-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-02-03T18:48:31.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"jylsec (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.250791","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.250791","tags":["signature","permissions-required"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/5/README.md","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T18:11:34.983Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.250791","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.250791","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/5/README.md","tags":["broken-link","exploit","x_transferred"]}]},{"affected":[{"vendor":"totolink","product":"lr1200gb_firmware","cpes":["cpe:2.3:o:totolink:lr1200gb_firmware:9.1.0u.6619_b20230130:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"9.1.0u.6619_B20230130","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-01-16T18:43:20.623188Z","id":"CVE-2024-0575","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-10T18:24:14.242Z"}}]}}