CVE-2024-33820

Totolink AC1200 Wireless Dual Band Gigabit Router A3002R_V4 Firmware V4.0.0-B20230531.1404 is vulnerable to Buffer Overflow via the formWlEncrypt function of the boa server. Specifically, they exploit the length of the wlan_ssid field triggers the overflow.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002r_firmware:4.0.0-b20230531.1404:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002r:v4:*:*:*:*:*:*:*

History

17 Jun 2025, 16:44

Type Values Removed Values Added
First Time Totolink a3002r Firmware
Totolink a3002r
Totolink
References () https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 - () https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 - Exploit, Third Party Advisory
CPE cpe:2.3:o:totolink:a3002r_firmware:4.0.0-b20230531.1404:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002r:v4:*:*:*:*:*:*:*

Information

Published : 2024-05-01 16:15

Updated : 2025-06-17 16:44


NVD link : CVE-2024-33820

Mitre link : CVE-2024-33820

CVE.ORG link : CVE-2024-33820


JSON object : View

Products Affected

totolink

  • a3002r
  • a3002r_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')