First published: Tue Aug 08 2023(Updated: )
TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setWiFiWpsConfig in /lib/cste_modules/wps.so. Attackers can send crafted data in an MQTT packet, via the pin parameter, to control the return address and execute code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink T10 V2 Firmware | =5.9c.5061_b20200511 | |
Totolink T10 V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40041 is critical with a score of 9.8.
CVE-2023-40041 allows attackers to execute code by exploiting a stack-based buffer overflow in the setWiFiWpsConfig function in /lib/cste_modules/wps.so.
An attacker can send crafted data in an MQTT packet, specifically via the pin parameter, to control the return address and execute code.
Yes, Totolink T10 V2 firmware version 5.9c.5061_b20200511 is vulnerable to CVE-2023-40041.
There is no information provided about available fixes or patches for CVE-2023-40041. It is recommended to contact the vendor for updates and advisories.