{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7175","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-07-28T05:34:53.160Z","datePublished":"2024-07-29T00:31:04.158Z","dateUpdated":"2024-08-01T21:52:30.999Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-07-29T00:31:04.158Z"},"title":"TOTOLINK A3600R cstecgi.cgi setDiagnosisCfg os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"CWE-78 OS Command Injection"}]}],"affected":[{"vendor":"TOTOLINK","product":"A3600R","versions":[{"version":"4.1.2cu.5182_B20201102","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability has been found in TOTOLINK A3600R 4.1.2cu.5182_B20201102 and classified as critical. This vulnerability affects the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ipDoamin leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272596. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In TOTOLINK A3600R 4.1.2cu.5182_B20201102 wurde eine kritische Schwachstelle gefunden. Das betrifft die Funktion setDiagnosisCfg der Datei /cgi-bin/cstecgi.cgi. Mittels dem Manipulieren des Arguments ipDoamin mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-07-28T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-07-28T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-07-28T07:39:59.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"wxhwxhwxh_mie (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.272596","name":"VDB-272596 | TOTOLINK A3600R cstecgi.cgi setDiagnosisCfg os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.272596","name":"VDB-272596 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.378042","name":"Submit #378042 | TOTOLINK A3600R V4.1.2cu.5182_B20201102 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDiagnosisCfg.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"totolink","product":"a3600r_firmware","cpes":["cpe:2.3:o:totolink:a3600r_firmware:4.1.2cu.5182_b20201102:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"4.1.2cu.5182_b20201102","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-29T17:47:53.428279Z","id":"CVE-2024-7175","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-29T20:56:35.684Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:52:30.999Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.272596","name":"VDB-272596 | TOTOLINK A3600R cstecgi.cgi setDiagnosisCfg os command injection","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.272596","name":"VDB-272596 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required","x_transferred"]},{"url":"https://vuldb.com/?submit.378042","name":"Submit #378042 | TOTOLINK A3600R V4.1.2cu.5182_B20201102 Buffer Overflow","tags":["third-party-advisory","x_transferred"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3600R/setDiagnosisCfg.md","tags":["exploit","x_transferred"]}]}]}}