Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A critical vulnerability has been discovered in TOTOLINK CP450 version 4.1.0cu.747_B20191224. This vulnerability affects an unknown part of the file /web_cste/cgi-bin/product.ini of the Telnet Service component. The issue stems from the use of a hard-coded password, which can be exploited remotely without any user interaction. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-7332.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-7331 | 8.8 HIGH | TOTOLINK A3300R cstecgi.cgi UploadCustomModule buffer overflow |
| CVE-2024-7333 | 8.8 HIGH | TOTOLINK N350RT cstecgi.cgi setParentalRules buffer overflow |
| CVE-2024-7334 | 8.8 HIGH | TOTOLINK EX1200L cstecgi.cgi UploadCustomModule buffer overflow |
| CVE-2024-7335 | 8.8 HIGH | TOTOLINK EX200 getSaveConfig buffer overflow |
| CVE-2024-7336 | 8.8 HIGH | TOTOLINK EX200 cstecgi.cgi loginauth buffer overflow |
| CVE-2024-7337 | 8.8 HIGH | TOTOLINK EX1200L cstecgi.cgi loginauth buffer overflow |
| CVE-2024-7338 | 8.8 HIGH | TOTOLINK EX1200L cstecgi.cgi setParentalRules buffer overflow |
No comments yet