Lucene search

K
cveMitreCVE-2024-34195
HistoryAug 28, 2024 - 8:15 p.m.

CVE-2024-34195

2024-08-2820:15:07
CWE-787
CWE-121
mitre
web.nvd.nist.gov
25
totolink
wireless router
firmware
buffer overflow
cgi handling
wlan_ssid
arbitrary command execution
denial of service

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.005

Percentile

76.0%

TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program’s CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx’s value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks.

Affected configurations

Nvd
Node
totolinka3002r_firmwareMatch1.1.1-b20200824
AND
totolinka3002rMatch-
VendorProductVersionCPE
totolinka3002r_firmware1.1.1-b20200824cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824:*:*:*:*:*:*:*
totolinka3002r-cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

High

EPSS

0.005

Percentile

76.0%

Related for CVE-2024-34195