{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7160","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-07-27T18:43:00.373Z","datePublished":"2024-07-28T15:00:07.203Z","dateUpdated":"2024-08-01T21:52:30.737Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-07-28T15:00:07.203Z"},"title":"TOTOLINK A3700R cstecgi.cgi setWanCfg command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"CWE-77 Command Injection"}]}],"affected":[{"vendor":"TOTOLINK","product":"A3700R","versions":[{"version":"9.1.2u.5822_B20200513","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical has been found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is the function setWanCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-272574 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in TOTOLINK A3700R 9.1.2u.5822_B20200513 entdeckt. Betroffen hiervon ist die Funktion setWanCfg der Datei /cgi-bin/cstecgi.cgi. Mittels dem Manipulieren des Arguments hostName mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-07-27T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-07-27T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-07-27T20:50:37.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yhryhryhr_tu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.272574","name":"VDB-272574 | TOTOLINK A3700R cstecgi.cgi setWanCfg command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.272574","name":"VDB-272574 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.377080","name":"Submit #377080 | TOTOLINK A3700R V9.1.2u.5822_B20200513 Command Injection","tags":["third-party-advisory"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/setWanCfg.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"totolink","product":"a3700r_firmware","cpes":["cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"9.1.2u.5822_b20200513","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-29T13:29:48.121455Z","id":"CVE-2024-7160","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-29T13:30:39.583Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:52:30.737Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.272574","name":"VDB-272574 | TOTOLINK A3700R cstecgi.cgi setWanCfg command injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.272574","name":"VDB-272574 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.377080","name":"Submit #377080 | TOTOLINK A3700R V9.1.2u.5822_B20200513 Command Injection","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/setWanCfg.md","tags":["exploit","x_transferred"]}]}]}}