Описание
TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setWiFiWpsConfig in /lib/cste_modules/wps.so. Attackers can send crafted data in an MQTT packet, via the pin parameter, to control the return address and execute code.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:totolink:t10_v2_firmware:5.9c.5061_b20200511:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t10_v2:-:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.00286
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-787
Связанные уязвимости
CVSS3: 9.8
github
больше 2 лет назад
TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setWiFiWpsConfig in /lib/cste_modules/wps.so. Attackers can send crafted data in an MQTT packet, via the pin parameter, to control the return address and execute code.
EPSS
Процентиль: 52%
0.00286
Низкий
9.8 Critical
CVSS3
Дефекты
CWE-787