First published: Wed Aug 28 2024(Updated: )
TOTOLINK AC1200 Wireless Router A3002R Firmware V1.1.1-B20200824 is vulnerable to Buffer Overflow. In the boa server program's CGI handling function formWlEncrypt, there is a lack of length restriction on the wlan_ssid field. This oversight leads to potential buffer overflow under specific circumstances. For instance, by invoking the formWlanRedirect function with specific parameters to alter wlan_idx's value and subsequently invoking the formWlEncrypt function, an attacker can trigger buffer overflow, enabling arbitrary command execution or denial of service attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink A3002r Firmware | =1.1.1-b20200824 | |
TOTOLINK A3002R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34195 is classified as a high severity vulnerability due to the potential for buffer overflow leading to remote code execution.
To fix CVE-2024-34195, update the TOTOLINK AC1200 Wireless Router A3002R to the latest firmware version released after 1.1.1-B20200824.
CVE-2024-34195 affects the TOTOLINK AC1200 Wireless Router A3002R running firmware version 1.1.1-B20200824.
Yes, CVE-2024-34195 can be exploited remotely due to vulnerabilities in the boa server program's CGI handling.
The risks of CVE-2024-34195 include unauthorized access and potential control of the affected wireless router.