Totolink AC1200 Wireless Dual Band Gigabit Router A3002R_V4 Firmware V4.0.0-B20230531.1404 is vulnerable to Buffer Overflow via the formWlEncrypt function of the boa server. Specifically, they exploit the length of the wlan_ssid field triggers the overflow.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 | Exploit Third Party Advisory |
https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Jun 2025, 16:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:totolink:a3002r_firmware:4.0.0-b20230531.1404:*:*:*:*:*:*:* cpe:2.3:h:totolink:a3002r:v4:*:*:*:*:*:*:* |
|
First Time |
Totolink a3002r Firmware
Totolink a3002r Totolink |
01 May 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 16:15
Updated : 2025-06-17 16:44
NVD link : CVE-2024-33820
Mitre link : CVE-2024-33820
JSON object : View
Products Affected
totolink
- a3002r
- a3002r_firmware
CWE
No CWE.