First published: Wed Nov 23 2022(Updated: )
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter ip in the setDiagnosisCfg function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 | ||
All of | ||
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44253 is a vulnerability in TOTOLINK LR350 V9.3.5u.6369_B20220309 that allows a buffer overflow via the 'ip' parameter in the setDiagnosisCfg function.
CVE-2022-44253 has a severity rating of 8.8, which is considered high.
CVE-2022-44253 affects TOTOLINK LR350 V9.3.5u.6369_B20220309 by allowing a post-authentication buffer overflow through the 'ip' parameter in the setDiagnosisCfg function.
To fix CVE-2022-44253, it is recommended to update to a secure version of TOTOLINK LR350 firmware that addresses the vulnerability.
More information about CVE-2022-44253 can be found at the following reference: [reference link](https://brief-nymphea-813.notion.site/LR350-bof-setDiagnosisCfg-bdae239f42e64a48a57b070b5bf17456)