CVE-2024-8579Classic Buffer Overflow in Ac1200 T8

Severity
8.7HIGHNVD
EPSS
0.3%
top 47.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 8

Description

A vulnerability classified as critical has been found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This affects the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5totolink/ac1200_t84.1.5cu.861_B20230220
NVDtotolink/t8_firmware4.1.5cu.861_b20230220

🔴Vulnerability Details

2
GHSA
GHSA-gfc5-9fgm-gcmj: A vulnerability classified as critical has been found in TOTOLINK AC1200 T8 42024-09-08
CVEList
TOTOLINK AC1200 T8 cstecgi.cgi setWiFiRepeaterCfg buffer overflow2024-09-08
CVE-2024-8579 — Classic Buffer Overflow in Ac1200 T8 | cvebase