First published: Wed Nov 23 2022(Updated: )
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter sPort/ePort in the setIpPortFilterRules function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 | ||
All of | ||
Totolink Lr350 Firmware | =9.3.5u.6369_b20220309 | |
TOTOLINK LR350 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-44260 is a vulnerability in TOTOLINK LR350 V9.3.5u.6369_B20220309 that allows a post-authentication buffer overflow via the sPort/ePort parameter in the setIpPortFilterRules function.
CVE-2022-44260 has a severity rating of 8.8 (high).
CVE-2022-44260 affects TOTOLINK LR350 firmware version 9.3.5u.6369_B20220309, allowing a post-authentication buffer overflow via the sPort/ePort parameter in the setIpPortFilterRules function.
To fix CVE-2022-44260, it is recommended to update the TOTOLINK LR350 firmware to a version that addresses the vulnerability.
The Common Weakness Enumeration (CWE) associated with CVE-2022-44260 is CWE-119 and CWE-787.