First published: Fri Jun 14 2024(Updated: )
TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWiFiEasyGuestCfg.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Totolink A3700R Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37640 is classified as a high-severity vulnerability due to its potential to cause a stack overflow.
To fix CVE-2024-37640, users should update the TOTOLINK A3700R firmware to the latest version released by the vendor.
CVE-2024-37640 specifically affects the TOTOLINK A3700R router with firmware version V9.1.2u.6165_20211012.
The impact of CVE-2024-37640 includes potential remote code execution and denial of service due to stack overflow.
The vulnerable component in CVE-2024-37640 is the 'ssid5g' parameter in the 'setWiFiEasyGuestCfg' function.