Description
TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.
Published: 2024-08-28
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00528}

epss

{'score': 0.00572}


Thu, 03 Jul 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3002ru
CPEs cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*
Vendors & Products Totolink a3002ru

Thu, 29 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3002ru Firmware
Weaknesses CWE-120
CPEs cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3002ru Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
Description TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.
References

Subscriptions

Totolink A3002ru A3002ru Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-29T16:19:15.121Z

Reserved: 2024-05-02T00:00:00.000Z

Link: CVE-2024-34198

cve-icon Vulnrichment

Updated: 2024-08-29T16:19:09.357Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-28T15:15:16.503

Modified: 2025-07-03T11:58:29.933

Link: CVE-2024-34198

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses