TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setStaticDhcpConfig in /lib/cste_modules/lan.so. Attackers can send crafted data in an MQTT packet, via the comment parameter, to control the return address and execute code.
References
Link | Resource |
---|---|
http://www.totolink.cn | Not Applicable |
https://github.com/Korey0sh1/IoT_vuln/blob/main/TOTOLINK/T10_V2/setStaticDhcpConfig.md | Exploit Third Party Advisory |
https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/172/ids/36.html | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-08-08 19:15
Updated : 2023-08-11 23:37
NVD link : CVE-2023-40042
Mitre link : CVE-2023-40042
CVE.ORG link : CVE-2023-40042
JSON object : View
Products Affected
totolink
- t10_v2_firmware
- t10_v2
CWE
CWE-787
Out-of-bounds Write