CVE-2024-7909 – TOTOLINK EX1200L cstecgi.cgi setLanguageCfg stack-based overflow
https://notcve.org/view.php?id=CVE-2024-7909
18 Aug 2024 — A vulnerability has been found in TOTOLINK EX1200L 9.3.5u.6146_B20201023 and classified as critical. Affected by this vulnerability is the function setLanguageCfg of the file /www/cgi-bin/cstecgi.cgi. The manipulation of the argument langType leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/BeaCox/IoT_vuln/tree/main/totolink/EX1200L/setLanguageCfg_bof • CWE-121: Stack-based Buffer Overflow •
CVE-2024-7908 – TOTOLINK EX1200L cstecgi.cgi setDefResponse stack-based overflow
https://notcve.org/view.php?id=CVE-2024-7908
18 Aug 2024 — A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. Affected is the function setDefResponse of the file /www/cgi-bin/cstecgi.cgi. The manipulation of the argument IpAddress leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?id.275034 • CWE-121: Stack-based Buffer Overflow •
CVE-2024-7338 – TOTOLINK EX1200L cstecgi.cgi setParentalRules buffer overflow
https://notcve.org/view.php?id=CVE-2024-7338
01 Aug 2024 — A vulnerability, which was classified as critical, was found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. This affects the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument week/sTime/eTime leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX1200/setParentalRules.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-7337 – TOTOLINK EX1200L cstecgi.cgi loginauth buffer overflow
https://notcve.org/view.php?id=CVE-2024-7337
01 Aug 2024 — A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. Affected by this issue is the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument http_host leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/EX1200/loginauth.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-7334 – TOTOLINK EX1200L cstecgi.cgi UploadCustomModule buffer overflow
https://notcve.org/view.php?id=CVE-2024-7334
01 Aug 2024 — A vulnerability was found in TOTOLINK EX1200L 9.3.5u.6146_B20201023. It has been rated as critical. This issue affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation leads to buffer overflow. The attack may be initiated remotely. • https://github.com/ruan-uer/create/blob/main/IoT-vulnerable/TOTOLINK/EX1200/UploadCustomModule.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2023-51033
https://notcve.org/view.php?id=CVE-2023-51033
22 Dec 2023 — TOTOlink EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution via the cstecgi.cgi setOpModeCfg interface. TOTOlink EX1200L V9.3.5u.6146_B20201023 es vulnerable a la ejecución de comandos arbitrarios a través de la interfaz cstecgi.cgi setOpModeCfg. • https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_setOpModeCfg • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-51034
https://notcve.org/view.php?id=CVE-2023-51034
22 Dec 2023 — TOTOlink EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution via the cstecgi.cgi UploadFirmwareFile interface. TOTOlink EX1200L V9.3.5u.6146_B20201023 es vulnerable a la ejecución de comandos arbitrarios a través de la interfaz cstecgi.cgi UploadFirmwareFile. • https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_UploadFirmwareFile • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2023-51035
https://notcve.org/view.php?id=CVE-2023-51035
22 Dec 2023 — TOTOLINK EX1200L V9.3.5u.6146_B20201023 is vulnerable to arbitrary command execution on the cstecgi.cgi NTPSyncWithHost interface. TOTOLINK EX1200L V9.3.5u.6146_B20201023 es vulnerable a la ejecución de comandos arbitrarios en la interfaz cstecgi.cgi NTPSyncWithHost. • https://815yang.github.io/2023/12/12/ex1200l/totolink_ex1200L_NTPSyncWithHost • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-4412 – TOTOLINK EX1200L setWanCfg os command injection
https://notcve.org/view.php?id=CVE-2023-4412
18 Aug 2023 — A vulnerability was found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This issue affects the function setWanCfg. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-4411 – TOTOLINK EX1200L setTracerouteCfg os command injection
https://notcve.org/view.php?id=CVE-2023-4411
18 Aug 2023 — A vulnerability has been found in TOTOLINK EX1200L EN_V9.3.5u.6146_B20201023 and classified as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://gist.github.com/dmknght/02a29e1c5ae18b45eacc2085d22068e8 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •