LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the ApCliSsid parameter in the generate_conf_router function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
References
Configurations
History
14 Mar 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
First Time |
Libtor lbt-t300 Firmware
Libtor lbt-t390 Libtor Libtor lbt-t390 Firmware Libtor lbt-t300 |
|
CPE | cpe:2.3:o:libtor:lbt-t390_firmware:2.2.1.8:*:*:*:*:*:*:* cpe:2.3:h:libtor:lbt-t300:*:*:*:*:*:*:*:* cpe:2.3:o:libtor:lbt-t300_firmware:2.2.1.8:*:*:*:*:*:*:* cpe:2.3:h:libtor:lbt-t390:*:*:*:*:*:*:*:* |
|
References | () https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md - Exploit | |
CWE | CWE-787 CWE-121 |
Information
Published : 2024-03-01 14:15
Updated : 2025-03-14 01:15
NVD link : CVE-2024-27570
Mitre link : CVE-2024-27570
CVE.ORG link : CVE-2024-27570
JSON object : View
Products Affected
libtor
- lbt-t300_firmware
- lbt-t390
- lbt-t300
- lbt-t390_firmware