{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T13:57:54.523","vulnerabilities":[{"cve":{"id":"CVE-2024-34198","sourceIdentifier":"cve@mitre.org","published":"2024-08-28T15:15:16.503","lastModified":"2025-07-03T11:58:29.933","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks."},{"lang":"es","value":"El enrutador inalámbrico TOTOLINK AC1200 A3002RU V2.1.1-B20230720.1011 es vulnerable a desbordamiento de búfer. El controlador CGI formWlEncrypt en el programa boa no limita la longitud del campo wlan_ssid de la entrada del usuario. Esto permite a los atacantes crear solicitudes HTTP maliciosas al proporcionar un valor excesivamente largo para el campo wlan_ssid, lo que provoca un desbordamiento de pila. Esto se puede explotar aún más para ejecutar comandos arbitrarios o lanzar ataques de denegación de servicio."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:totolink:a3002ru_firmware:2.1.1-b20230720.1011:*:*:*:*:*:*:*","matchCriteriaId":"2B8D2528-D15C-41C6-81A2-7DA16DDDE57F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*","matchCriteriaId":"21945D3C-27AA-4614-8D5D-C22DE8C56F94"}]}]}],"references":[{"url":"https://gist.github.com/Swind1er/02f6cb414e440c34878f20fef756e286","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]}]}}]}