First published: Wed Nov 23 2022(Updated: )
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter week, sTime, and eTime in the setParentalRules function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 | ||
All of | ||
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this TOTOLINK LR350 vulnerability is CVE-2022-44259.
The severity of CVE-2022-44259 is high with a CVSS score of 8.8.
CVE-2022-44259 affects TOTOLINK LR350 firmware 9.3.5u.6369_b20220309 through a post-authentication buffer overflow via the 'week', 'sTime', and 'eTime' parameters in the 'setParentalRules' function.
No, TOTOLINK LR350 is not vulnerable to CVE-2022-44259.
There is no official fix available for CVE-2022-44259 in TOTOLINK LR350 firmware 9.3.5u.6369_b20220309 at this time. It is recommended to monitor the vendor's website for any updates or patches.