ID

VAR-202308-3044


CVE

CVE-2023-40041


TITLE

TOTOLINK T10 pin parameter buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2023-64451

DESCRIPTION

TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setWiFiWpsConfig in /lib/cste_modules/wps.so. Attackers can send crafted data in an MQTT packet, via the pin parameter, to control the return address and execute code. TOTOLINK T10 is a wireless network system router produced by China Zeon Electronics (TOTOLINK). The vulnerability is caused by the fact that the pin parameter in setWiFiWpsConfig fails to correctly verify the length of the input data. Remote attackers can use this vulnerability to execute arbitrary code on the system or cause a denial of service attack

Trust: 1.44

sources: NVD: CVE-2023-40041 // CNVD: CNVD-2023-64451

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2023-64451

AFFECTED PRODUCTS

vendor:totolinkmodel:t10 v2scope:eqversion:5.9c.5061_b20200511

Trust: 1.0

vendor:totolinkmodel:t10 t10 v2 5.9c.5061 b20200511scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2023-64451 // NVD: CVE-2023-40041

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-40041
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2023-64451
value: HIGH

Trust: 0.6

CNVD: CNVD-2023-64451
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2023-40041
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2023-64451 // NVD: CVE-2023-40041

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2023-40041

EXTERNAL IDS

db:NVDid:CVE-2023-40041

Trust: 1.6

db:CNVDid:CNVD-2023-64451

Trust: 0.6

sources: CNVD: CNVD-2023-64451 // NVD: CVE-2023-40041

REFERENCES

url:https://github.com/korey0sh1/iot_vuln/blob/main/totolink/t10_v2/lib-cste_modules-wps.md

Trust: 1.6

sources: CNVD: CNVD-2023-64451 // NVD: CVE-2023-40041

SOURCES

db:CNVDid:CNVD-2023-64451
db:NVDid:CVE-2023-40041

LAST UPDATE DATE

2024-08-14T15:20:58.004000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2023-64451date:2023-08-23T00:00:00
db:NVDid:CVE-2023-40041date:2023-08-11T23:35:53.310

SOURCES RELEASE DATE

db:CNVDid:CNVD-2023-64451date:2023-08-18T00:00:00
db:NVDid:CVE-2023-40041date:2023-08-08T19:15:10.800