cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-7336,https://securityvulnerability.io/vulnerability/CVE-2024-7336,Buffer Overflow Vulnerability in TOTOLINK EX200,"A critical buffer overflow vulnerability has been identified in the TOTOLINK EX200 router, specifically within the loginauth feature found in the file /cgi-bin/cstecgi.cgi. This vulnerability arises from improper handling of the 'http_host' argument, which can be manipulated by attackers to potentially execute arbitrary code or crash the device. This flaw allows attackers to launch remote exploits, making it imperative for users and organizations to address this vulnerability promptly. Despite prior outreach, the vendor has not responded to disclosures regarding this critical security issue. It is crucial for users of the affected version to apply necessary mitigations or updates to safeguard their systems.",Totolink,Ex200,8.8,HIGH,0.0017900000093504786,false,false,false,true,true,false,false,2024-08-01T02:31:04.790Z,0 CVE-2024-7335,https://securityvulnerability.io/vulnerability/CVE-2024-7335,Buffer Overflow Vulnerability in EX200 Could Lead to Remote Execution,"A vulnerability exists in the TOTOLINK EX200 version 4.0.3c.7646_B20201211 within the getSaveConfig function located in /cgi-bin/cstecgi.cgi?action=save&setting. The vulnerability arises from improper handling of the argument http_host, which could result in a buffer overflow, allowing an attacker to exploit this remotely. The details of this vulnerability have been publicly disclosed, raising concerns about its potential exploitation. The vendor has not provided any response to prior disclosures regarding this issue.",Totolink,Ex200,8.8,HIGH,0.0017900000093504786,false,false,false,true,true,false,false,2024-08-01T02:00:06.560Z,0 CVE-2021-43711,https://securityvulnerability.io/vulnerability/CVE-2021-43711,,The downloadFlile.cgi binary file in TOTOLINK EX200 V4.0.3c.7646_B20201211 has a command injection vulnerability when receiving GET parameters. The parameter name can be constructed for unauthenticated command execution.,Totolink,Ex200 Firmware,9.8,CRITICAL,0.05761000141501427,false,false,false,false,,false,false,2022-01-04T13:49:47.000Z,0