TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.
History

Thu, 29 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3002ru Firmware
Weaknesses CWE-120
CPEs cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3002ru Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
Description TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-08-28T00:00:00

Updated: 2024-08-29T16:19:15.121Z

Reserved: 2024-05-02T00:00:00

Link: CVE-2024-34198

cve-icon Vulnrichment

Updated: 2024-08-29T16:19:09.357Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-28T15:15:16.503

Modified: 2024-08-29T20:36:45.497

Link: CVE-2024-34198

cve-icon Redhat

No data.