CVE-2024-34195

TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks.
References
Link Resource
https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824:*:*:*:*:*:*:*
cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-08-28 20:15

Updated : 2024-08-30 15:59


NVD link : CVE-2024-34195

Mitre link : CVE-2024-34195

CVE.ORG link : CVE-2024-34195


JSON object : View

Products Affected

totolink

  • a3002r
  • a3002r_firmware
CWE
CWE-787

Out-of-bounds Write

CWE-121

Stack-based Buffer Overflow