TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Aug 2024 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Totolink
Totolink a3002ru Firmware |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:* | |
Vendors & Products |
Totolink
Totolink a3002ru Firmware |
|
Metrics |
cvssV3_1
|
Wed, 28 Aug 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-08-28T00:00:00
Updated: 2024-08-29T16:19:15.121Z
Reserved: 2024-05-02T00:00:00
Link: CVE-2024-34198
Vulnrichment
Updated: 2024-08-29T16:19:09.357Z
NVD
Status : Awaiting Analysis
Published: 2024-08-28T15:15:16.503
Modified: 2024-08-29T20:36:45.497
Link: CVE-2024-34198
Redhat
No data.