A stack-based buffer overflow vulnerability exists in the wireless.cgi SetName() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Link | Tags |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-2039 | third party advisory exploit |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2039 | exploit third party advisory |