First published: Sun Sep 08 2024(Updated: )
A vulnerability classified as critical has been found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This affects the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Totolink T8 Firmware | =4.1.5cu.861_b20230220 | |
TOTOLINK T8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8579 is classified as a critical vulnerability.
To mitigate CVE-2024-8579, update to the latest firmware version that addresses this vulnerability.
CVE-2024-8579 is a buffer overflow vulnerability affecting the TOTOLINK AC1200 T8.
CVE-2024-8579 specifically affects the TOTOLINK AC1200 T8 running firmware version 4.1.5cu.861_B20230220.
The function setWiFiRepeaterCfg in the file /cgi-bin/cstecgi.cgi is vulnerable in CVE-2024-8579.