Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-34677 | Totolink AC1200 Wireless Dual Band Gigabit Router A3002RU_V3 Firmware V3.0.0-B20230809.1615 is vulnerable to Buffer Overflow. The "boa" program allows attackers to modify the value of the "vwlan_idx" field via "formMultiAP". This can lead to a stack overflow through the "formWlEncrypt" CGI function by constructing malicious HTTP requests and passing a WLAN SSID value exceeding the expected length, potentially resulting in command execution or denial of service attacks. |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 18 Jun 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink a3002ru-v3
|
|
| CPEs | cpe:2.3:h:totolink:a3002ru-v3:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink a3002ru-v3
|
Thu, 13 Feb 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Totolink
Totolink a3002ru-v3 Firmware |
|
| CPEs | cpe:2.3:o:totolink:a3002ru-v3_firmware:3.0.0-b20230809.1615:*:*:*:*:*:*:* | |
| Vendors & Products |
Totolink
Totolink a3002ru-v3 Firmware |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-13T15:53:03.516Z
Reserved: 2024-05-02T00:00:00.000Z
Link: CVE-2024-34196
Updated: 2024-08-02T02:51:11.133Z
Status : Analyzed
Published: 2024-05-14T15:38:32.730
Modified: 2025-06-18T14:30:01.220
Link: CVE-2024-34196
No data.
OpenCVE Enrichment
No data.
EUVD