إرسال #797452: TOTOLINK A3002MU A3002MU_Hh-B20211125.1046 Stack-based Buffer Overflowالمعلومات

عنوانTOTOLINK A3002MU A3002MU_Hh-B20211125.1046 Stack-based Buffer Overflow
الوصفIn the binary file `/bin/boa`, the function formWlanSetup obtains the value of the **`wan-url`** parameter from the front-end HTTP request **without performing any length validation**. Subsequently, the value is copied into a **fixed-size buffer** using an unsafe string copy operation. If an attacker sends a sufficiently long `wan-url` string, it will overflow the buffer and corrupt adjacent memory regions, resulting in a **buffer overflow vulnerability**. Successful exploitation could lead to denial of service (DoS) .
المصدر⚠️ https://github.com/zhuchan770/vulnerability/blob/main/A3002MU/formWlanSetup/ToToLinkA3002MU%20formWlanSetup%20339996b67c9780caafb2d351dfd8a889.md
المستخدم
 DLChen (UID 97003)
ارسال05/04/2026 07:45 PM (15 أيام منذ)
الاعتدال13/04/2026 10:43 AM (8 days later)
الحالةتمت الموافقة
إدخال VulDB357116 [Totolink A3002MU B20211125.1046 HTTP Request /boafrm/formWlanSetup sub_410188 wan-url تلف الذاكرة]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!