A vulnerability classified as critical was found in TOTOLINK T6 4.1.5cu.748_B20211015. This vulnerability affects the function tcpcheck_net of the file /router/meshSlaveDlfw of the component MQTT Packet Handler. The manipulation of the argument serverIp leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://vuldb.com/?id.317584 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.317584 | permissions required signature |
https://vuldb.com/?submit.620834 | third party advisory vdb entry |
https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/9.md | related third party advisory exploit |
https://github.com/AnduinBrian/Public/blob/main/Totolink%20T6/Vuln/9.md#poc | third party advisory exploit |
https://www.totolink.net/ | product |