We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as critical, was found in TOTOLINK A3700R 9.1.2u.5822_B20200513. Affected is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine Schwachstelle in TOTOLINK A3700R 9.1.2u.5822_B20200513 gefunden. Sie wurde als kritisch eingestuft. Es geht dabei um die Funktion setWiFiEasyGuestCfg der Datei /cgi-bin/cstecgi.cgi. Durch Beeinflussen mit unbekannten Daten kann eine improper access controls-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
Incorrect Privilege Assignment
2025-04-15: | Advisory disclosed |
2025-04-15: | VulDB entry created |
2025-04-15: | VulDB entry last update |
yhryhryhr (VulDB User)
vuldb.com/?id.304842 (VDB-304842 | TOTOLINK A3700R cstecgi.cgi setWiFiEasyGuestCfg access control)
vuldb.com/?ctiid.304842 (VDB-304842 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.551296 (Submit #551296 | TOTOLINK A3700R V9.1.2u.5822_B20200513 Improper Access Controls)
lavender-bicycle-a5a.notion.site/...5f9ee3f1b2d362d3f2?pvs=4
www.totolink.net/
Support options