CVE-2024-34198

Severity
9.8CRITICAL
EPSS
0.4%
top 38.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 28

Description

TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDtotolink/a3002ru_firmware2.1.1-b20230720.1011

🔴Vulnerability Details

2
GHSA
GHSA-4j37-x4vf-9p6c: TOTOLINK AC1200 Wireless Router A3002RU V22024-08-28
CVEList
CVE-2024-34198: TOTOLINK AC1200 Wireless Router A3002RU V22024-08-28
CVE-2024-34198 (CRITICAL CVSS 9.8) | TOTOLINK AC1200 Wireless Router A30 | cvebase.io