A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513 and classified as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/ExportSettings.sh of the component apmib Configuration Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-272570 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References
Link | Resource |
---|---|
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md | Exploit |
https://vuldb.com/?ctiid.272570 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.272570 | Permissions Required Third Party Advisory |
https://vuldb.com/?submit.377473 | Third Party Advisory |
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md | Exploit |
https://vuldb.com/?ctiid.272570 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.272570 | Permissions Required Third Party Advisory |
https://vuldb.com/?submit.377473 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2024-07-28 11:15
Updated : 2024-11-21 09:50
NVD link : CVE-2024-7156
Mitre link : CVE-2024-7156
CVE.ORG link : CVE-2024-7156
JSON object : View
Products Affected
totolink
- a3700r
- a3700r_firmware
CWE