Buffer Overflow Vulnerability in TOTOLINK AC1200 T8 and T10 Products
CVE-2024-8576
Key Information:
- Vendor
- Totolink
- Status
- Vendor
- CVE Published:
- 8 September 2024
Badges
Summary
A significant buffer overflow vulnerability has been identified in the TOTOLINK AC1200 T8 and AC1200 T10 routers, specifically in the setIpPortFilterRules function located within the cgi-bin/cstecgi.cgi file. This vulnerability enables an attacker to manipulate the 'desc' parameter, potentially leading to code execution via a remote attack. The exploit has been publicly disclosed, and even though the vendor was notified prior to the disclosure, no response was received. Users of these routers are advised to take immediate action to secure their devices.
Affected Version(s)
AC1200 T10 4.1.5cu.861_B20230220
AC1200 T10 4.1.8cu.5207
AC1200 T8 4.1.5cu.861_B20230220
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved