First published: Sun Sep 08 2024(Updated: )
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. It has been rated as critical. Affected by this issue is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument device_name leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink T8 Firmware | =4.1.5cu.861_b20230220 | |
TOTOLINK T8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8578 has been rated as critical due to the potential for a buffer overflow vulnerability.
To fix CVE-2024-8578, users should update the TOTOLINK AC1200 T8 firmware to a patched version that addresses this vulnerability.
CVE-2024-8578 affects the TOTOLINK AC1200 T8 running firmware version 4.1.5cu.861_B20230220.
CVE-2024-8578 is a buffer overflow vulnerability found in the function setWiFiMeshName of the firmware.
An attacker exploiting CVE-2024-8578 could potentially take control of the device through the manipulation of the device_name argument.