ID

VAR-202310-0416


CVE

CVE-2023-45985


TITLE

TOTOLINK  of  X5000R  firmware and  a7000r  Out-of-bounds write vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2023-014846

DESCRIPTION

TOTOLINK X5000R V9.1.0u.6118_B20201102 and TOTOLINK A7000R V9.1.0u.6115_B20201022 were discovered to contain a stack overflow in the function setParentalRules. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. TOTOLINK of X5000R firmware and a7000r An out-of-bounds write vulnerability exists in firmware.Service operation interruption (DoS) It may be in a state. TOTOLINK X5000R is a router. TOTOLINK A7000R is a wireless router

Trust: 2.16

sources: NVD: CVE-2023-45985 // JVNDB: JVNDB-2023-014846 // CNVD: CNVD-2023-78237

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-78237

AFFECTED PRODUCTS

vendor:totolinkmodel:x5000rscope:eqversion:9.1.0u.6118_b20201102

Trust: 1.0

vendor:totolinkmodel:a7000rscope:eqversion:9.1.0u.6115_b20201022

Trust: 1.0

vendor:totolinkmodel:x5000rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a7000rscope: - version: -

Trust: 0.8

vendor:totolinkmodel:x5000r v9.1.0u.6118 b20201102scope: - version: -

Trust: 0.6

vendor:totolinkmodel:a7000r v9.1.0u.6115 b20201022scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-78237 // JVNDB: JVNDB-2023-014846 // NVD: CVE-2023-45985

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-45985
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-45985
value: HIGH

Trust: 1.0

NVD: CVE-2023-45985
value: HIGH

Trust: 0.8

CNVD: CNVD-2023-78237
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2023-78237
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-45985
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 2.0

NVD: CVE-2023-45985
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-78237 // JVNDB: JVNDB-2023-014846 // NVD: CVE-2023-45985 // NVD: CVE-2023-45985

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

problemtype:Out-of-bounds writing (CWE-787) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-014846 // NVD: CVE-2023-45985

PATCH

title:Patch for TOTOLINK X5000R and A7000R setParentalRules function stack overflow vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/470451

Trust: 0.6

sources: CNVD: CNVD-2023-78237

EXTERNAL IDS

db:NVDid:CVE-2023-45985

Trust: 3.2

db:JVNDBid:JVNDB-2023-014846

Trust: 0.8

db:CNVDid:CNVD-2023-78237

Trust: 0.6

sources: CNVD: CNVD-2023-78237 // JVNDB: JVNDB-2023-014846 // NVD: CVE-2023-45985

REFERENCES

url:https://github.com/archerber/bug_submit/blob/main/totolink/setparentalrules.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-45985

Trust: 1.4

sources: CNVD: CNVD-2023-78237 // JVNDB: JVNDB-2023-014846 // NVD: CVE-2023-45985

SOURCES

db:CNVDid:CNVD-2023-78237
db:JVNDBid:JVNDB-2023-014846
db:NVDid:CVE-2023-45985

LAST UPDATE DATE

2024-10-31T23:13:06.492000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-78237date:2023-10-19T00:00:00
db:JVNDBid:JVNDB-2023-014846date:2023-12-26T05:24:00
db:NVDid:CVE-2023-45985date:2024-10-30T20:35:04.147

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-78237date:2023-10-19T00:00:00
db:JVNDBid:JVNDB-2023-014846date:2023-12-26T00:00:00
db:NVDid:CVE-2023-45985date:2023-10-16T18:15:16.577