Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37639: n/a

0
High
VulnerabilityCVE-2024-37639cvecve-2024-37639
Published: Fri Jun 14 2024 (06/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via eport in the function setIpPortFilterRules.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:42:52 UTC

Technical Analysis

CVE-2024-37639 is a stack overflow vulnerability identified in the TOTOLINK A3700R router firmware version V9.1.2u.6165_20211012. The vulnerability is located in the setIpPortFilterRules function, which processes input via the eport interface. A stack overflow occurs when specially crafted input exceeds the buffer capacity, overwriting adjacent memory on the stack. This can lead to arbitrary code execution, denial of service, or complete device compromise. The vulnerability requires no privileges or user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS v3.1 score of 8.8 reflects the ease of exploitation (attack vector: adjacent network), low attack complexity, and the potential for full confidentiality, integrity, and availability impact. The weakness is categorized under CWE-121 (Stack-based Buffer Overflow), a common and dangerous class of vulnerabilities. No patches or known exploits are currently reported, but the absence of a patch increases urgency for mitigation. The TOTOLINK A3700R is a consumer and small business router, meaning exploitation could affect home users and small enterprises, potentially allowing attackers to intercept or manipulate network traffic or disrupt connectivity.

Potential Impact

The vulnerability allows remote attackers to execute arbitrary code or cause denial of service on affected TOTOLINK A3700R routers without authentication. This could lead to full compromise of the device, enabling attackers to intercept sensitive data, manipulate network traffic, or use the device as a foothold for further attacks within the network. For organizations, this could result in data breaches, loss of network availability, and erosion of trust in network infrastructure. Small businesses and home users relying on this router model are particularly at risk, as they may lack robust security monitoring or rapid patch management capabilities. The widespread use of TOTOLINK devices in certain regions increases the potential scale of impact. Additionally, compromised routers can be recruited into botnets or used to launch attacks against other targets, amplifying the threat beyond the initial victim.

Mitigation Recommendations

1. Immediately restrict remote management access to the TOTOLINK A3700R router, especially from untrusted networks, to reduce exposure to remote exploitation. 2. Disable or limit the use of the eport interface or any related services that interact with setIpPortFilterRules if possible. 3. Monitor network traffic for unusual patterns or attempts to exploit the vulnerability, focusing on malformed packets targeting port filtering functions. 4. Contact TOTOLINK support or check official channels regularly for firmware updates or patches addressing CVE-2024-37639, and apply them promptly once available. 5. As a temporary measure, consider replacing vulnerable devices with alternative hardware that is actively maintained and patched. 6. Implement network segmentation to isolate vulnerable devices from critical infrastructure. 7. Educate users and administrators about the risk and signs of compromise related to this vulnerability. 8. Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c6ab7ef31ef0b563cf9

Added to database: 2/25/2026, 9:40:58 PM

Last enriched: 2/28/2026, 3:42:52 AM

Last updated: 4/12/2026, 5:14:43 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses