First published: Wed Nov 23 2022(Updated: )
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter command in the setTracerouteCfg function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 | ||
All of | ||
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44258 is a vulnerability in TOTOLINK LR350 V9.3.5u.6369_B20220309 that allows for a post-authentication buffer overflow via the 'command' parameter in the setTracerouteCfg function.
CVE-2022-44258 has a severity score of 8.8, which is considered high.
CVE-2022-44258 affects TOTOLINK LR350 Firmware version 9.3.5u.6369_b20220309 by allowing a post-authentication buffer overflow through the 'command' parameter in the setTracerouteCfg function.
Currently, there is no known fix or patch available for CVE-2022-44258. It is recommended to monitor the vendor's security advisories for updates or mitigations.
CWE-119 refers to Improper Restriction of Operations within the Bounds of a Memory Buffer, while CWE-787 refers to Out-of-bounds Write.