TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks.
References
Link | Resource |
---|---|
https://gist.github.com/Swind1er/84161b607d06d060fba5adcdd92bceb4 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2024-08-28 20:15
Updated : 2024-08-30 15:59
NVD link : CVE-2024-34195
Mitre link : CVE-2024-34195
CVE.ORG link : CVE-2024-34195
JSON object : View
Products Affected
totolink
- a3002r
- a3002r_firmware