Lucene search

K
vulnrichmentMitreVULNRICHMENT:CVE-2024-42966
HistoryAug 15, 2024 - 12:00 a.m.

CVE-2024-42966

2024-08-1500:00:00
mitre
github.com
2
totolink n350rt
access control
configuration file
crafted request
cve-2024-42966

AI Score

6.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Incorrect access control in TOTOLINK N350RT V9.3.5u.6139_B20201216 allows attackers to obtain the apmib configuration file, which contains the username and the password, via a crafted request to /cgi-bin/ExportSettings.sh.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:totolink:n350rt_firmware:9.3.5u.6139_b20201216:*:*:*:*:*:*:*"
    ],
    "vendor": "totolink",
    "product": "n350rt_firmware",
    "versions": [
      {
        "status": "affected",
        "version": "9.3.5u.6139_b20201216"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

6.8

Confidence

Low

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-42966