mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
105 lines
3.9 KiB
JSON
105 lines
3.9 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-7221",
|
|
"ASSIGNER": "cna@vuldb.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A vulnerability was found in Totolink T6 4.1.9cu.5241_B20210923. It has been classified as critical. This affects the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument v41 leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249855. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
|
},
|
|
{
|
|
"lang": "deu",
|
|
"value": "Es wurde eine Schwachstelle in Totolink T6 4.1.9cu.5241_B20210923 ausgemacht. Sie wurde als kritisch eingestuft. Es betrifft die Funktion main der Datei /cgi-bin/cstecgi.cgi?action=login der Komponente HTTP POST Request Handler. Dank Manipulation des Arguments v41 mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-120 Buffer Overflow",
|
|
"cweId": "CWE-120"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Totolink",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "T6",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "4.1.9cu.5241_B20210923"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://vuldb.com/?id.249855",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?id.249855"
|
|
},
|
|
{
|
|
"url": "https://vuldb.com/?ctiid.249855",
|
|
"refsource": "MISC",
|
|
"name": "https://vuldb.com/?ctiid.249855"
|
|
},
|
|
{
|
|
"url": "https://github.com/jylsec/vuldb/blob/main/TOTOLINK/T6/1/README.md",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/jylsec/vuldb/blob/main/TOTOLINK/T6/1/README.md"
|
|
}
|
|
]
|
|
},
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "jylsec (VulDB User)"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"baseScore": 9.8,
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
{
|
|
"version": "3.0",
|
|
"baseScore": 9.8,
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
{
|
|
"version": "2.0",
|
|
"baseScore": 10,
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
|
|
}
|
|
]
|
|
}
|
|
} |