TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter command in the setTracerouteCfg function.
References
Link | Resource |
---|---|
https://brief-nymphea-813.notion.site/LR350-bof-setTracerouteCfg-cca08814d6b24733ade00b2dae1d4c1a | Exploit Third Party Advisory |
https://brief-nymphea-813.notion.site/LR350-bof-setTracerouteCfg-cca08814d6b24733ade00b2dae1d4c1a | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://brief-nymphea-813.notion.site/LR350-bof-setTracerouteCfg-cca08814d6b24733ade00b2dae1d4c1a - Exploit, Third Party Advisory |
Information
Published : 2022-11-23 16:15
Updated : 2024-11-21 07:27
NVD link : CVE-2022-44258
Mitre link : CVE-2022-44258
CVE.ORG link : CVE-2022-44258
JSON object : View
Products Affected
totolink
- lr350
- lr350_firmware
CWE
CWE-787
Out-of-bounds Write