Totolink AC1200 Wireless Dual Band Gigabit Router A3002RU_V3 Firmware V3.0.0-B20230809.1615 is vulnerable to Buffer Overflow. The "boa" program allows attackers to modify the value of the "vwlan_idx" field via "formMultiAP". This can lead to a stack overflow through the "formWlEncrypt" CGI function by constructing malicious HTTP requests and passing a WLAN SSID value exceeding the expected length, potentially resulting in command execution or denial of service attacks.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Totolink
Totolink a3002ru-v3 Firmware |
|
CPEs | cpe:2.3:o:totolink:a3002ru-v3_firmware:3.0.0-b20230809.1615:*:*:*:*:*:*:* | |
Vendors & Products |
Totolink
Totolink a3002ru-v3 Firmware |
|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mitre
Published: 2024-05-08T21:35:35.815Z
Updated: 2025-02-13T15:53:03.516Z
Reserved: 2024-05-02T00:00:00.000Z
Link: CVE-2024-34196

Updated: 2024-08-02T02:51:11.133Z

Status : Awaiting Analysis
Published: 2024-05-14T15:38:32.730
Modified: 2024-11-21T09:18:14.660
Link: CVE-2024-34196

No data.