Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34198: n/a

0
Critical
VulnerabilityCVE-2024-34198cvecve-2024-34198
Published: Wed Aug 28 2024 (08/28/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK AC1200 Wireless Router A3002RU V2.1.1-B20230720.1011 is vulnerable to Buffer Overflow. The formWlEncrypt CGI handler in the boa program fails to limit the length of the wlan_ssid field from user input. This allows attackers to craft malicious HTTP requests by supplying an excessively long value for the wlan_ssid field, leading to a stack overflow. This can be further exploited to execute arbitrary commands or launch denial-of-service attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:09:16 UTC

Technical Analysis

CVE-2024-34198 is a stack-based buffer overflow vulnerability found in the TOTOLINK AC1200 Wireless Router A3002RU, specifically in firmware version V2.1.1-B20230720.1011. The vulnerability resides in the formWlEncrypt CGI handler implemented in the embedded boa web server, which processes HTTP requests related to wireless encryption settings. The handler fails to enforce length restrictions on the wlan_ssid parameter, allowing an attacker to supply an overly long string. This unchecked input leads to a stack overflow condition, which can corrupt the program’s control flow. Exploiting this flaw enables remote attackers to execute arbitrary code with the privileges of the boa process, potentially leading to full system compromise or denial-of-service (DoS) by crashing the router. The vulnerability requires no authentication or user interaction and can be triggered remotely over the network, making it highly exploitable. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicates a critical risk with high impact on confidentiality, integrity, and availability. Currently, no patches or mitigations have been officially released by TOTOLINK, and no public exploit code is known to exist. The underlying weakness corresponds to CWE-120 (Classic Buffer Overflow).

Potential Impact

The impact of CVE-2024-34198 is severe for organizations using the affected TOTOLINK AC1200 Wireless Router A3002RU firmware. Successful exploitation can lead to complete compromise of the router, allowing attackers to execute arbitrary commands remotely. This can result in unauthorized network access, interception or manipulation of network traffic, and disruption of network services via denial-of-service attacks. Compromised routers may also serve as footholds for lateral movement within internal networks or be used as part of botnets for large-scale attacks. Given the router’s role as a network gateway device, the vulnerability threatens confidentiality, integrity, and availability of organizational networks. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where these routers are exposed to untrusted networks or the internet. The absence of patches further exacerbates the risk, potentially leading to widespread exploitation once exploit code becomes available.

Mitigation Recommendations

1. Immediately isolate affected TOTOLINK AC1200 Wireless Router A3002RU devices from untrusted networks, especially the internet, until a patch is available. 2. Monitor network traffic for unusual HTTP requests targeting the router’s web interface, particularly those containing abnormally long wlan_ssid parameters. 3. Implement network-level protections such as firewall rules or intrusion prevention systems (IPS) to block suspicious requests to the router’s management interface. 4. Contact TOTOLINK support to inquire about official patches or firmware updates addressing CVE-2024-34198 and apply them promptly once released. 5. If possible, replace vulnerable routers with alternative models or vendors that have no known vulnerabilities. 6. Employ network segmentation to limit the exposure of critical devices and management interfaces. 7. Regularly audit and update router firmware to maintain security hygiene and reduce attack surface. 8. Educate network administrators about this vulnerability and ensure they follow secure configuration best practices, such as disabling remote management if not needed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4cb7ef31ef0b56217e

Added to database: 2/25/2026, 9:40:28 PM

Last enriched: 2/28/2026, 3:09:16 AM

Last updated: 4/12/2026, 6:16:58 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses