First published: Tue Aug 08 2023(Updated: )
TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setStaticDhcpConfig in /lib/cste_modules/lan.so. Attackers can send crafted data in an MQTT packet, via the comment parameter, to control the return address and execute code.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink T10 V2 Firmware | =5.9c.5061_b20200511 | |
Totolink T10 V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-40042 is critical with a CVSS score of 9.8.
CVE-2023-40042 is a stack-based buffer overflow vulnerability in TOTOLINK T10_v2 firmware version 5.9c.5061_B20200511.
Attackers can exploit CVE-2023-40042 by sending crafted data in an MQTT packet through the comment parameter.
CVE-2023-40042 allows attackers to control the return address and execute code on the affected device.
To fix CVE-2023-40042, update the TOTOLINK T10_v2 firmware to a version that does not have the stack-based buffer overflow vulnerability.