Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46419: n/a

0
Critical
VulnerabilityCVE-2024-46419cvecve-2024-46419
Published: Mon Sep 16 2024 (09/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWizardCfg function via the ssid5g parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:36:47 UTC

Technical Analysis

CVE-2024-46419 is a critical security vulnerability identified in the TOTOLINK AC1200 T8 router firmware version 4.1.5cu.861_B20230220. The vulnerability is a classic buffer overflow (CWE-120) in the setWizardCfg function, which processes configuration parameters, specifically the ssid5g parameter. Buffer overflow flaws occur when input data exceeds the allocated buffer size, leading to memory corruption. In this case, an attacker can craft a malicious request containing an overly long or malformed ssid5g parameter to overflow the buffer. This can result in arbitrary code execution on the device with the highest privileges, as the router firmware typically runs with root-level access. The vulnerability requires no authentication (PR:N) and no user interaction (UI:N), making it highly exploitable remotely over the network (AV:N). The scope is unchanged (S:U), meaning the impact is confined to the vulnerable device but affects confidentiality, integrity, and availability fully (C:H/I:H/A:H). The router is commonly used in home and small office environments, often exposed to the internet or local networks. No patches or official fixes have been published yet, and no public exploits have been reported, but the high CVSS score indicates an urgent need for remediation. The vulnerability was reserved on 2024-09-11 and published on 2024-09-16, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2024-46419 is severe for organizations and individuals using the TOTOLINK AC1200 T8 router. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full device compromise. This can enable attackers to intercept or manipulate network traffic, launch further attacks on internal networks, disrupt internet connectivity, or use the device as a foothold for persistent access. The compromise of router firmware undermines the confidentiality and integrity of all data passing through the device and can cause denial of service conditions. Given the router’s common deployment in home and small business environments, the threat extends to a broad user base. The lack of a patch increases the risk window, and attackers may develop exploits rapidly due to the straightforward nature of buffer overflow vulnerabilities. Organizations relying on this hardware for critical connectivity or security functions face significant operational and reputational risks.

Mitigation Recommendations

1. Immediately disable remote management interfaces on the TOTOLINK AC1200 T8 router to prevent external exploitation. 2. Restrict network access to the router’s management interface to trusted internal IP addresses only. 3. Segment the network to isolate the router from critical systems and sensitive data. 4. Monitor network traffic for unusual patterns or unauthorized configuration changes that may indicate exploitation attempts. 5. Regularly audit connected devices and firmware versions to identify vulnerable units. 6. Contact TOTOLINK support for any available firmware updates or advisories and apply patches promptly once released. 7. Consider replacing vulnerable devices with models from vendors with faster security response times if immediate patching is not feasible. 8. Employ intrusion detection/prevention systems capable of recognizing exploit attempts targeting this vulnerability. 9. Educate users about the risks of exposing router management interfaces to the internet and enforce strong network security policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfeb7ef31ef0b56ac11

Added to database: 2/25/2026, 9:43:26 PM

Last enriched: 2/26/2026, 8:36:47 AM

Last updated: 4/12/2026, 3:39:44 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses