Totolink AC1200 Wireless Dual Band Gigabit Router A3002RU_V3 Firmware V3.0.0-B20230809.1615 is vulnerable to Buffer Overflow. The "boa" program allows attackers to modify the value of the "vwlan_idx" field via "formMultiAP". This can lead to a stack overflow through the "formWlEncrypt" CGI function by constructing malicious HTTP requests and passing a WLAN SSID value exceeding the expected length, potentially resulting in command execution or denial of service attacks.
History

Thu, 13 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3002ru-v3 Firmware
CPEs cpe:2.3:o:totolink:a3002ru-v3_firmware:3.0.0-b20230809.1615:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3002ru-v3 Firmware
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-02-13T15:53:03.516Z

Reserved: 2024-05-02T00:00:00.000Z

Link: CVE-2024-34196

cve-icon Vulnrichment

Updated: 2024-08-02T02:51:11.133Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-14T15:38:32.730

Modified: 2024-11-21T09:18:14.660

Link: CVE-2024-34196

cve-icon Redhat

No data.