TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks.
References
Link | Resource |
---|---|
https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
30 Aug 2024, 15:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Totolink a3002r
Totolink a3002r Firmware Totolink |
|
CPE | cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824:*:*:*:*:*:*:* cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:* |
|
CWE | CWE-787 | |
References | () https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4 - Exploit, Third Party Advisory |
29 Aug 2024, 13:25
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
28 Aug 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-121 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
28 Aug 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-28 20:15
Updated : 2024-08-30 15:59
NVD link : CVE-2024-34195
Mitre link : CVE-2024-34195
CVE.ORG link : CVE-2024-34195
JSON object : View
Products Affected
totolink
- a3002r_firmware
- a3002r