CVE-2024-0578 – Totolink LR1200GB cstecgi.cgi UploadCustomModule stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0578
16 Jan 2024 — A vulnerability classified as critical has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected is the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/8/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0577 – Totolink LR1200GB cstecgi.cgi setLanguageCfg stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0577
16 Jan 2024 — A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been rated as critical. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument lang leads to stack-based buffer overflow. The attack may be initiated remotely. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/7/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0576 – Totolink LR1200GB cstecgi.cgi setIpPortFilterRules stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0576
16 Jan 2024 — A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been declared as critical. This vulnerability affects the function setIpPortFilterRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sPort leads to stack-based buffer overflow. The attack can be initiated remotely. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/6/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0575 – Totolink LR1200GB cstecgi.cgi setTracerouteCfg stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0575
16 Jan 2024 — A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130. It has been classified as critical. This affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to stack-based buffer overflow. It is possible to initiate the attack remotely. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/5/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0574 – Totolink LR1200GB cstecgi.cgi setParentalRules stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0574
16 Jan 2024 — A vulnerability was found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this issue is the function setParentalRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument sTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/4/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0573 – Totolink LR1200GB cstecgi.cgi setDiagnosisCfg stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0573
16 Jan 2024 — A vulnerability has been found in Totolink LR1200GB 9.1.0u.6619_B20230130 and classified as critical. Affected by this vulnerability is the function setDiagnosisCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/3/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0572 – Totolink LR1200GB cstecgi.cgi setOpModeCfg stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0572
16 Jan 2024 — A vulnerability, which was classified as critical, was found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected is the function setOpModeCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument pppoeUser leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/2/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0571 – Totolink LR1200GB cstecgi.cgi setSmsCfg stack-based overflow
https://notcve.org/view.php?id=CVE-2024-0571
16 Jan 2024 — A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. This issue affects the function setSmsCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument text leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/1/README.md • CWE-121: Stack-based Buffer Overflow •
CVE-2024-0295 – Totolink LR1200GB cstecgi.cgi setWanCfg os command injection
https://notcve.org/view.php?id=CVE-2024-0295
08 Jan 2024 — A vulnerability, which was classified as critical, was found in Totolink LR1200GB 9.1.0u.6619_B20230130. This affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setWanCfg/README.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2024-0294 – Totolink LR1200GB cstecgi.cgi setUssd os command injection
https://notcve.org/view.php?id=CVE-2024-0294
08 Jan 2024 — A vulnerability, which was classified as critical, has been found in Totolink LR1200GB 9.1.0u.6619_B20230130. Affected by this issue is the function setUssd of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ussd leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. • https://github.com/jylsec/vuldb/blob/main/TOTOLINK/LR1200GB/setUssd/README.md • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •