Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37633: n/a

0
High
VulnerabilityCVE-2024-37633cvecve-2024-37633
Published: Thu Jun 13 2024 (06/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiGuestCfg

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:42:10 UTC

Technical Analysis

CVE-2024-37633 is a stack overflow vulnerability identified in the TOTOLINK A3700R router firmware version V9.1.2u.6165_20211012. The vulnerability arises from improper input validation in the setWiFiGuestCfg function, specifically when processing the SSID parameter. A stack overflow occurs when the input exceeds the buffer size allocated on the stack, potentially overwriting return addresses or other control data. This can lead to arbitrary code execution, allowing an attacker to gain control over the device remotely. The vulnerability requires no authentication or user interaction, increasing its exploitability. The CVSS v3.1 score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with an attack vector over the network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The affected device is a consumer-grade router commonly used in home and small office environments. While no patches or exploits are currently publicly available, the vulnerability is classified under CWE-121 (Stack-based Buffer Overflow), a well-known and dangerous class of software flaws. The lack of patch links indicates that vendors have yet to release an official fix, underscoring the need for interim mitigations.

Potential Impact

Successful exploitation of this stack overflow vulnerability can lead to full compromise of the affected router, allowing attackers to execute arbitrary code with system-level privileges. This can result in unauthorized access to network traffic, interception of sensitive data, disruption of network services, and potential pivoting to other devices within the network. The confidentiality, integrity, and availability of the network environment are all at risk. For organizations, this could mean exposure of internal communications, data breaches, and denial of service conditions. Given that the vulnerability requires no authentication and no user interaction, remote attackers can exploit it stealthily, increasing the risk of widespread attacks. The absence of known exploits in the wild currently provides a window for proactive defense, but the high severity score suggests that exploitation could have severe consequences if weaponized.

Mitigation Recommendations

Until an official patch is released by TOTOLINK, organizations should implement the following mitigations: 1) Restrict remote management access to the router, especially from untrusted networks, by disabling WAN-side administration interfaces or limiting them via firewall rules. 2) Employ network segmentation to isolate vulnerable devices from critical assets and sensitive data. 3) Monitor network traffic for unusual patterns or attempts to exploit the setWiFiGuestCfg function, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 4) Regularly audit and update router firmware once vendor patches become available. 5) Consider replacing affected devices with models from vendors with more timely security update practices if patching is delayed. 6) Educate users about the risks of exposing router management interfaces and encourage strong administrative credentials. These steps provide layered defense to reduce the attack surface and mitigate potential exploitation risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6ab7ef31ef0b563cf0

Added to database: 2/25/2026, 9:40:58 PM

Last enriched: 2/28/2026, 3:42:10 AM

Last updated: 4/12/2026, 3:40:43 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses