ID

VAR-202407-2448


CVE

CVE-2024-7214


TITLE

TOTOLINK  of  lr350  Command injection vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-005014

DESCRIPTION

A vulnerability has been found in TOTOLINK LR350 9.3.5u.6369_B20220309 and classified as critical. Affected by this vulnerability is the function setWanCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument hostName leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272785 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of lr350 Firmware contains a command injection vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK LR350 is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the hostName parameter in the setWanCfg function of the /cgi-bin/cstecgi.cgi page failing to properly filter special characters and commands in the constructed command. Attackers can exploit this vulnerability to cause arbitrary command execution

Trust: 2.16

sources: NVD: CVE-2024-7214 // JVNDB: JVNDB-2024-005014 // CNVD: CNVD-2024-36757

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-36757

AFFECTED PRODUCTS

vendor:totolinkmodel:lr350scope:eqversion:9.3.5u.6369_b20220309

Trust: 1.0

vendor:totolinkmodel:lr350scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:lr350scope:eqversion:lr350 firmware 9.3.5u.6369 b20220309

Trust: 0.8

vendor:totolinkmodel:lr350scope: - version: -

Trust: 0.8

vendor:totolinkmodel:lr350 9.3.5u.6369 b20220309scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-36757 // JVNDB: JVNDB-2024-005014 // NVD: CVE-2024-7214

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-7214
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2024-7214
value: HIGH

Trust: 1.0

OTHER: JVNDB-2024-005014
value: HIGH

Trust: 0.8

CNVD: CNVD-2024-36757
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2024-7214
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2024-005014
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2024-36757
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2024-7214
baseSeverity: MEDIUM
baseScore: 6.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 2.8
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-7214
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2024-005014
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-36757 // JVNDB: JVNDB-2024-005014 // NVD: CVE-2024-7214 // NVD: CVE-2024-7214

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.0

problemtype:Command injection (CWE-77) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-005014 // NVD: CVE-2024-7214

EXTERNAL IDS

db:NVDid:CVE-2024-7214

Trust: 3.2

db:VULDBid:272785

Trust: 1.8

db:JVNDBid:JVNDB-2024-005014

Trust: 0.8

db:CNVDid:CNVD-2024-36757

Trust: 0.6

sources: CNVD: CNVD-2024-36757 // JVNDB: JVNDB-2024-005014 // NVD: CVE-2024-7214

REFERENCES

url:https://github.com/abcdefg-png/iot-vulnerable/blob/main/totolink/lr350/setwancfg.md

Trust: 1.8

url:https://vuldb.com/?id.272785

Trust: 1.8

url:https://vuldb.com/?submit.378319

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-7214

Trust: 1.4

url:https://vuldb.com/?ctiid.272785

Trust: 1.0

sources: CNVD: CNVD-2024-36757 // JVNDB: JVNDB-2024-005014 // NVD: CVE-2024-7214

SOURCES

db:CNVDid:CNVD-2024-36757
db:JVNDBid:JVNDB-2024-005014
db:NVDid:CVE-2024-7214

LAST UPDATE DATE

2024-08-29T23:01:35.135000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-36757date:2024-08-28T00:00:00
db:JVNDBid:JVNDB-2024-005014date:2024-08-08T03:13:00
db:NVDid:CVE-2024-7214date:2024-08-06T14:08:05.393

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-36757date:2024-08-23T00:00:00
db:JVNDBid:JVNDB-2024-005014date:2024-08-08T00:00:00
db:NVDid:CVE-2024-7214date:2024-07-30T03:15:02.127