First published: Tue Jun 11 2024(Updated: )
TOTOLINK AC1200 Wireless Dual Band Gigabit Router firmware A3100R V4.1.2cu.5247_B20211129, in the cgi function `setNoticeCfg` of the file `/lib/cste_modules/system.so`, the length of the user input string `NoticeUrl` is not checked. This can lead to a buffer overflow, allowing attackers to construct malicious HTTP or MQTT requests to cause a denial-of-service attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink AC1200 Wireless Dual Band Gigabit Router A3002R_V4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36650 is classified as a critical vulnerability due to the potential for a buffer overflow leading to remote code execution.
To fix CVE-2024-36650, update the firmware of the TOTOLINK AC1200 Wireless Dual Band Gigabit Router to the latest version available from the manufacturer.
CVE-2024-36650 can allow attackers to exploit the buffer overflow vulnerability to execute arbitrary code on the affected router.
Yes, routers running the specified firmware version A3100R V4.1.2cu.5247_B20211129 are vulnerable to CVE-2024-36650.
If you cannot update the firmware, it is advised to disconnect the router from the internet to mitigate the risk associated with CVE-2024-36650.