{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7157","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-07-27T17:27:22.979Z","datePublished":"2024-07-28T11:00:06.342Z","dateUpdated":"2024-08-01T21:52:30.570Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-07-28T11:00:06.342Z"},"title":"TOTOLINK A3100R getSaveConfig buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Overflow"}]}],"affected":[{"vendor":"TOTOLINK","product":"A3100R","versions":[{"version":"4.1.2cu.5050_B20200504","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in TOTOLINK A3100R 4.1.2cu.5050_B20200504. It has been classified as critical. This affects the function getSaveConfig of the file /cgi-bin/cstecgi.cgi?action=save&setting. The manipulation of the argument http_host leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272571. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine Schwachstelle in TOTOLINK A3100R 4.1.2cu.5050_B20200504 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion getSaveConfig der Datei /cgi-bin/cstecgi.cgi?action=save&setting. Mit der Manipulation des Arguments http_host mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}}],"timeline":[{"time":"2024-07-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-07-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-07-27T19:32:41.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yhryhryhr_tu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.272571","name":"VDB-272571 | TOTOLINK A3100R getSaveConfig buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.272571","name":"VDB-272571 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.377542","name":"Submit #377542 | TOTOLINK A3100R V4.1.2cu.5050_B20200504 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3100R/getSaveConfig.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"totolink","product":"a3100r_firmware","cpes":["cpe:2.3:o:totolink:a3100r_firmware:4.1.2cu.5050_b20200504:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"4.1.2cu.5050_b20200504","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-29T13:56:08.258073Z","id":"CVE-2024-7157","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-29T13:56:54.838Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:52:30.570Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.272571","name":"VDB-272571 | TOTOLINK A3100R getSaveConfig buffer overflow","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.272571","name":"VDB-272571 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.377542","name":"Submit #377542 | TOTOLINK A3100R V4.1.2cu.5050_B20200504 Buffer Overflow","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3100R/getSaveConfig.md","tags":["exploit","x_transferred"]}]}]}}