TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.

Project Subscriptions

Vendors Products
Totolink Subscribe
A3002ru Subscribe
A3002ru Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00528}

epss

{'score': 0.00572}


Thu, 03 Jul 2025 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Totolink a3002ru
CPEs cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*
Vendors & Products Totolink a3002ru

Thu, 29 Aug 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Totolink
Totolink a3002ru Firmware
Weaknesses CWE-120
CPEs cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*
Vendors & Products Totolink
Totolink a3002ru Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 28 Aug 2024 15:00:00 +0000

Type Values Removed Values Added
Description TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-29T16:19:15.121Z

Reserved: 2024-05-02T00:00:00

Link: CVE-2024-34198

cve-icon Vulnrichment

Updated: 2024-08-29T16:19:09.357Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-28T15:15:16.503

Modified: 2025-07-03T11:58:29.933

Link: CVE-2024-34198

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses