CVE-2024-34198
CRITICALTOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 - Buffer Overflow via wlan_ssid
Title source: llmDescription
TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.
References (1)
Core 1
Core References
Exploit, Third Party Advisory
https://gist.github.com/Swind1er/02f6cb414e440c34878f20fef756e286
Scores
CVSS v3
9.8
EPSS
0.0042
EPSS Percentile
61.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-120
Status
published
Products (1)
totolink/a3002ru_firmware
2.1.1-b20230720.1011
Published
Aug 28, 2024
Tracked Since
Feb 18, 2026