Buffer Overflow Vulnerability in TOTOLINK AC1200 T8 Router
CVE-2024-8575
Key Information:
Badges
Summary
A critical buffer overflow vulnerability has been identified in the TOTOLINK AC1200 T8 router, specifically in the setWiFiScheduleCfg function of the cstecgi.cgi file. This vulnerability arises from improper handling of the 'desc' argument, allowing attackers to manipulate the memory allocation and execute arbitrary code. The exploit can be initiated remotely, putting devices at significant risk if left unpatched. Despite early disclosure attempts to the vendor, there has been no response. Users of the affected version (4.1.5cu.861_B20230220) are strongly advised to monitor for updates and apply necessary mitigations to protect their devices.
Affected Version(s)
AC1200 T8 4.1.5cu.861_B20230220
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved