Buffer Overflow Vulnerability in Wavlink AC3000 Router
CVE-2024-37184
9.1CRITICAL
What is CVE-2024-37184?
A vulnerability in the adm.cgi rep_as_bridge() functionality of the Wavlink AC3000 M33A8 router allows for stack-based buffer overflow. This issue arises when an attacker sends a specially crafted HTTP request. If the request is authenticated, it can trigger the overflow, potentially leading to unauthorized access or execution of arbitrary code on the device.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Wavlink AC3000 M33A8.V5030.210505
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Credit
Discovered by Lilith >_> of Cisco Talos.
