| Titre | TOTOLINK T6 V4.1.5cu.748_B20211015 Buffer Overflow |
|---|
| Description | The T6 routers has many shared library that will be loaded in memory when running. In function tcpcheck_net, the v7 buffer is 128 bytes, and the sprintf doesn't check for the length of input.
An attacker can send a malicious packet (both MQTT and HTTP) and overwrite the saved return address, lead it to RCE.
|
|---|
| La source | ⚠️ https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/9.md |
|---|
| Utilisateur | reisen_1943 (UID 76990) |
|---|
| Soumission | 22/07/2025 17:42 (il y a 9 mois) |
|---|
| Modérer | 25/07/2025 09:36 (3 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 317584 [TOTOLINK T6 4.1.5cu.748_B20211015 MQTT Packet /router/meshSlaveDlfw tcpcheck_net serverIp buffer overflow] |
|---|
| Points | 19 |
|---|