First published: Sun Sep 08 2024(Updated: )
A vulnerability was found in TOTOLINK AC1200 T8 and AC1200 T10 4.1.5cu.861_B20230220/4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setStaticDhcpRules of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument desc leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink T8 Firmware | =4.1.5cu.861_b20230220 | |
TOTOLINK T8 | ||
All of | ||
Totolink T10 Firmware | =4.1.8cu.5207 | |
TOTOLINK T10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8577 has been declared as critical.
To fix CVE-2024-8577, update to the latest firmware version for TOTOLINK AC1200 T8 or T10.
CVE-2024-8577 affects TOTOLINK AC1200 T8 firmware version 4.1.5cu.861_B20230220 and AC1200 T10 firmware version 4.1.8cu.5207.
The vulnerability in CVE-2024-8577 is located in the function setStaticDhcpRules of the file /cgi-bin/cstecgi.cgi.
CVE-2024-8577 is classified as a buffer overflow vulnerability.