漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
TOTOLINK A702R/A3002R/A3002RU HTTP POST Request formWirelessTbl buffer overflow
Vulnerability Description
A vulnerability, which was classified as critical, has been found in TOTOLINK A702R, A3002R and A3002RU 3.0.0-B20230809.1615. This issue affects some unknown processing of the file /boafrm/formWirelessTbl of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)
Vulnerability Title
TOTOLINK A720R、TOTOLINK A3002R和TOTOLINK A3002RU 安全漏洞
Vulnerability Description
TOTOLINK A3002RU等都是中国吉翁电子(TOTOLINK)公司的产品。TOTOLINK A3002RU是一款无线路由器产品。TOTOLINK A720R是一款无线路由器。TOTOLINK A3002R是一款无线路由器。 TOTOLINK A720R、TOTOLINK A3002R和TOTOLINK A3002RU 3.0.0-B20230809.1615版本存在安全漏洞,该漏洞源于对文件/boafrm/formWirelessTbl中参数submit-url的错误操作导致缓冲区溢出。
CVSS Information
N/A
Vulnerability Type
N/A