A vulnerability was found in TOTOLINK A3700R 9.1.2u.5822_B20200513 and classified as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/ExportSettings.sh of the component apmib Configuration Handler. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-272570 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md | Exploit | 
| https://vuldb.com/?ctiid.272570 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.272570 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?submit.377473 | Third Party Advisory | 
| https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md | Exploit | 
| https://vuldb.com/?ctiid.272570 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?id.272570 | Permissions Required Third Party Advisory | 
| https://vuldb.com/?submit.377473 | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 09:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md - Exploit | |
| References | () https://vuldb.com/?ctiid.272570 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?id.272570 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?submit.377473 - Third Party Advisory | |
| CVSS | v2 : v3 : | v2 : 5.0 v3 : 5.3 | 
08 Aug 2024, 12:20
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| First Time | Totolink a3700r Firmware Totolink Totolink a3700r | |
| CVSS | v2 : v3 : | v2 : 5.0 v3 : 7.5 | 
| CPE | cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.5822_b20200513:*:*:*:*:*:*:* cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:* | |
| References | () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/A3700R/ExportSettings.md - Exploit | |
| References | () https://vuldb.com/?ctiid.272570 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?id.272570 - Permissions Required, Third Party Advisory | |
| References | () https://vuldb.com/?submit.377473 - Third Party Advisory | 
29 Jul 2024, 14:12
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | 
28 Jul 2024, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-07-28 11:15
Updated : 2024-11-21 09:50
NVD link : CVE-2024-7156
Mitre link : CVE-2024-7156
CVE.ORG link : CVE-2024-7156
JSON object : View
Products Affected
                totolink
- a3700r_firmware
- a3700r
CWE
                