CVE-2024-8162 – TOTOLINK T10 AC1200 Telnet Service product.ini hard-coded credentials
https://notcve.org/view.php?id=CVE-2024-8162
A vulnerability classified as critical has been found in TOTOLINK T10 AC1200 4.1.8cu.5207. Affected is an unknown function of the file /squashfs-root/web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to hard-coded credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/rohitburke/TOTOLINK https://vuldb.com/?ctiid.275760 https://vuldb.com/?id.275760 https://vuldb.com/?submit.392015 https://www.totolink.net • CWE-798: Use of Hard-coded Credentials •
CVE-2024-7464 – TOTOLINK CP900 Telnet Service setTelnetCfg command injection
https://notcve.org/view.php?id=CVE-2024-7464
A vulnerability, which was classified as critical, has been found in TOTOLINK CP900 6.3c.566. This issue affects the function setTelnetCfg of the component Telnet Service. The manipulation of the argument telnet_enabled leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP900/setTelnetCfg.md https://vuldb.com/?ctiid.273557 https://vuldb.com/?id.273557 https://vuldb.com/?submit.381334 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2024-7463 – TOTOLINK CP900 cstecgi.cgi UploadCustomModule buffer overflow
https://notcve.org/view.php?id=CVE-2024-7463
A vulnerability classified as critical was found in TOTOLINK CP900 6.3c.566. This vulnerability affects the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CP900/UploadCustomModule.md https://vuldb.com/?ctiid.273556 https://vuldb.com/?id.273556 https://vuldb.com/?submit.381333 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-7217 – TOTOLINK CA300-PoE cstecgi.cgi loginauth buffer overflow
https://notcve.org/view.php?id=CVE-2024-7217
A vulnerability was found in TOTOLINK CA300-PoE 6.2c.884. It has been declared as critical. This vulnerability affects the function loginauth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. The attack can be initiated remotely. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/CA300-PoE/loginauth_password.md https://vuldb.com/?ctiid.272788 https://vuldb.com/?id.272788 https://vuldb.com/?submit.378333 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2024-7216 – TOTOLINK LR1200 shadow.sample hard-coded password
https://notcve.org/view.php?id=CVE-2024-7216
A vulnerability was found in TOTOLINK LR1200 9.3.1cu.2832. It has been classified as problematic. This affects an unknown part of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The complexity of an attack is rather high. • https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/LR1200/shadow.md https://vuldb.com/?ctiid.272787 https://vuldb.com/?id.272787 https://vuldb.com/?submit.378331 • CWE-259: Use of Hard-coded Password •