ID

VAR-202312-0393


CVE

CVE-2023-6906


TITLE

TOTOLINK  of  A7100RU  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2023-020316

DESCRIPTION

A vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_B20191024. Affected is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag with the input ie8 leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248268. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of A7100RU Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK A7100RU is a wireless router made by China Zeon Electronics (TOTOLINK) Company. Totolink A7100RU 7.4cu.2313_B20191024 version has a buffer overflow vulnerability. A remote attacker can use this vulnerability to execute arbitrary code on the system or Lead to denial of service attacks

Trust: 2.16

sources: NVD: CVE-2023-6906 // JVNDB: JVNDB-2023-020316 // CNVD: CNVD-2023-99634

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-99634

AFFECTED PRODUCTS

vendor:totolinkmodel:a7100ruscope:eqversion:7.4cu.2313_b20191024

Trust: 1.0

vendor:totolinkmodel:a7100ruscope: - version: -

Trust: 0.8

vendor:totolinkmodel:a7100ruscope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:a7100ruscope:eqversion:a7100ru firmware 7.4cu.2313 b20191024

Trust: 0.8

vendor:totolinkmodel:a7100ru 7.4cu.2313 b20191024scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-99634 // JVNDB: JVNDB-2023-020316 // NVD: CVE-2023-6906

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2023-6906
value: CRITICAL

Trust: 1.0

nvd@nist.gov: CVE-2023-6906
value: CRITICAL

Trust: 1.0

NVD: CVE-2023-6906
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2023-99634
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2023-6906
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2023-99634
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2023-6906
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2023-6906
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2023-99634 // JVNDB: JVNDB-2023-020316 // NVD: CVE-2023-6906 // NVD: CVE-2023-6906

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-020316 // NVD: CVE-2023-6906

EXTERNAL IDS

db:NVDid:CVE-2023-6906

Trust: 3.2

db:VULDBid:248268

Trust: 1.8

db:JVNDBid:JVNDB-2023-020316

Trust: 0.8

db:CNVDid:CNVD-2023-99634

Trust: 0.6

sources: CNVD: CNVD-2023-99634 // JVNDB: JVNDB-2023-020316 // NVD: CVE-2023-6906

REFERENCES

url:https://github.com/unpwn4bl3/iot-security/blob/main/1.md

Trust: 1.8

url:https://vuldb.com/?id.248268

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2023-6906

Trust: 1.4

url:https://vuldb.com/?ctiid.248268

Trust: 1.0

sources: CNVD: CNVD-2023-99634 // JVNDB: JVNDB-2023-020316 // NVD: CVE-2023-6906

SOURCES

db:CNVDid:CNVD-2023-99634
db:JVNDBid:JVNDB-2023-020316
db:NVDid:CVE-2023-6906

LAST UPDATE DATE

2024-08-14T14:01:30.275000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-99634date:2023-12-22T00:00:00
db:JVNDBid:JVNDB-2023-020316date:2024-01-16T06:06:00
db:NVDid:CVE-2023-6906date:2024-05-17T02:34:00.270

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-99634date:2023-12-21T00:00:00
db:JVNDBid:JVNDB-2023-020316date:2024-01-16T00:00:00
db:NVDid:CVE-2023-6906date:2023-12-18T04:15:51.227