First published: Wed May 18 2022(Updated: )
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a stack overflow via the macAddress parameter in the function setMacQos. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3100R | =4.1.2cu.5050_b20200504 | |
Totolink A3100R | =4.1.2cu.5247_b20211129 | |
Totolink A3100R Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-29643.
The severity of CVE-2022-29643 is high with a CVSS score of 7.5.
CVE-2022-29643 affects TOTOLINK A3100R firmware versions 4.1.2cu.5050_b20200504 and 4.1.2cu.5247_b20211129.
CVE-2022-29643 allows attackers to cause a Denial of Service (DoS) by exploiting a stack overflow vulnerability via the macAddress parameter in the setMacQos function.
Yes, TOTOLINK A3100R version 4.1.2cu.5247_b20211129 is vulnerable to CVE-2022-29643.