First published: Sun Sep 08 2024(Updated: )
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220 and classified as critical. This issue affects the function setWiFiScheduleCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink T8 Firmware | =4.1.5cu.861_b20230220 | |
TOTOLINK T8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8575 is classified as critical due to its potential for remote exploitation and buffer overflow vulnerabilities.
To fix CVE-2024-8575, users should update their TOTOLINK AC1200 T8 firmware to a version that addresses this vulnerability.
CVE-2024-8575 affects the TOTOLINK T8 firmware version 4.1.5cu.861_B20230220.
Yes, CVE-2024-8575 can be exploited remotely through manipulation of specific arguments.
The function setWiFiScheduleCfg in the file /cgi-bin/cstecgi.cgi is vulnerable in CVE-2024-8575.