Vulnerability Description
TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setStaticDhcpConfig in /lib/cste_modules/lan.so. Attackers can send crafted data in an MQTT packet, via the comment parameter, to control the return address and execute code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totolink | T10 V2 Firmware | 5.9c.5061_b20200511 |
| Totolink | T10 V2 | - |
Related Weaknesses (CWE)
References
- http://www.totolink.cnNot Applicable
- https://github.com/Korey0sh1/IoT_vuln/blob/main/TOTOLINK/T10_V2/setStaticDhcpConExploitThird Party Advisory
- https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/172/ids/36.htProduct
- http://www.totolink.cnNot Applicable
- https://github.com/Korey0sh1/IoT_vuln/blob/main/TOTOLINK/T10_V2/setStaticDhcpConExploitThird Party Advisory
- https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/172/ids/36.htProduct
FAQ
What is CVE-2023-40042?
CVE-2023-40042 is a vulnerability with a CVSS score of 9.8 (CRITICAL). TOTOLINK T10_v2 5.9c.5061_B20200511 has a stack-based buffer overflow in setStaticDhcpConfig in /lib/cste_modules/lan.so. Attackers can send crafted data in an MQTT packet, via the comment parameter, ...
How severe is CVE-2023-40042?
CVE-2023-40042 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-40042?
Check the references section above for vendor advisories and patch information. Affected products include: Totolink T10 V2 Firmware, Totolink T10 V2.