First published: Fri Feb 04 2022(Updated: )
TOTOLINK A720R v4.1.5cu.470_B20200911 was discovered to contain a stack overflow in the setWiFiWpsStart function. This vulnerability allows attackers to cause a Denial of Service (DoS) via the pin parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A720r Firmware | =4.1.5cu.470_b20200911 | |
TOTOLINK A720R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this TOTOLINK A720R vulnerability is CVE-2021-45740.
The severity of CVE-2021-45740 is critical with a CVSS score of 9.8.
The affected software version of CVE-2021-45740 is TOTOLINK A720R v4.1.5cu.470_B20200911.
The impact of CVE-2021-45740 is a Denial of Service (DoS) attack that can be caused by an attacker using the pin parameter.
You can find more information about CVE-2021-45740 at the following link: https://github.com/pjqwudi/my_vuln/blob/main/totolink/vuln_4/4.md