First published: Tue May 10 2022(Updated: )
TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a stack overflow via the comment parameter in the function FUN_004192cc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink N600r Firmware | =4.3.0cu.7647_b20210106 | |
TOTOLINK N600R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-29393 is critical with a CVSS score of 9.8.
TOTOLINK N600R firmware version 4.3.0cu.7647_b20210106 is affected by CVE-2022-29393, which exposes a stack overflow vulnerability through the comment parameter in the function FUN_004192cc.
No, TOTOLINK N600R is not vulnerable to CVE-2022-29393.
To fix the stack overflow vulnerability in TOTOLINK N600R firmware version 4.3.0cu.7647_b20210106, it is recommended to update to a patched version provided by the vendor.
You can find more information about CVE-2022-29393 at the following reference: https://github.com/d1tto/IoT-vuln/tree/main/Totolink/3.setIpQosRules