{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7463","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-08-04T08:15:43.528Z","datePublished":"2024-08-05T00:31:04.075Z","dateUpdated":"2024-08-05T13:55:20.896Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-08-05T00:31:04.075Z"},"title":"TOTOLINK CP900 cstecgi.cgi UploadCustomModule buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"CWE-120 Buffer Overflow"}]}],"affected":[{"vendor":"TOTOLINK","product":"CP900","versions":[{"version":"6.3c.566","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as critical was found in TOTOLINK CP900 6.3c.566. This vulnerability affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-273556. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"In TOTOLINK CP900 6.3c.566 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Das betrifft die Funktion UploadCustomModule der Datei /cgi-bin/cstecgi.cgi. Durch Manipulieren des Arguments File mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C"}}],"timeline":[{"time":"2024-08-04T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-08-04T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-08-04T10:21:02.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"yhryhryhr_tu (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.273556","name":"VDB-273556 | TOTOLINK CP900 cstecgi.cgi UploadCustomModule buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.273556","name":"VDB-273556 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.381333","name":"Submit #381333 | TOTOLINK CP900  V6.3c.566 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP900/UploadCustomModule.md","tags":["exploit"]}]},"adp":[{"affected":[{"vendor":"totolink","product":"cp900_firmware","cpes":["cpe:2.3:o:totolink:cp900_firmware:6.3c.566:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.3c.566","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-05T13:54:15.892067Z","id":"CVE-2024-7463","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-05T13:55:20.896Z"}}]}}