{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7336","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-07-31T12:30:21.759Z","datePublished":"2024-08-01T02:31:04.790Z","dateUpdated":"2024-08-01T13:30:01.939Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-08-01T02:31:04.790Z"},"title":"TOTOLINK EX200 cstecgi.cgi loginauth buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Overflow"}]}],"affected":[{"vendor":"TOTOLINK","product":"EX200","versions":[{"version":"4.0.3c.7646_B20201211","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in TOTOLINK EX200 4.0.3c.7646_B20201211. Affected by this vulnerability is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273259. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In TOTOLINK EX200 4.0.3c.7646_B20201211 wurde eine kritische Schwachstelle entdeckt. Hierbei betrifft es die Funktion loginauth der Datei /cgi-bin/cstecgi.cgi. Durch Manipulieren des Arguments http_host mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}}],"timeline":[{"time":"2024-07-31T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-07-31T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-07-31T14:35:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yhryhryhr_tu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.273259","name":"VDB-273259 | TOTOLINK EX200 cstecgi.cgi loginauth buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.273259","name":"VDB-273259 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.379314","name":"Submit #379314 | TOTOLINK EX200 V4.0.3c.7646_B20201211 buffer overflow","tags":["third-party-advisory"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX200/loginauth.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"totolink","product":"ex200_firmware","cpes":["cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"4.0.3c.7646_b20201211","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-01T13:28:52.459505Z","id":"CVE-2024-7336","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-01T13:30:01.939Z"}}]}}