ID

VAR-202408-2466


CVE

CVE-2024-8079


TITLE

TOTOLINK  of  T8  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-007081

DESCRIPTION

A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been rated as critical. This issue affects the function exportOvpn. The manipulation leads to buffer overflow. The attack may be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. TOTOLINK of T8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK AC1200 T8 is a dual-band full-gigabit router from China's TOTOLINK Electronics. An attacker can use this vulnerability to submit special requests, which can cause the service program to crash or execute arbitrary code in the context of the application

Trust: 2.16

sources: NVD: CVE-2024-8079 // JVNDB: JVNDB-2024-007081 // CNVD: CNVD-2025-01815

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-01815

AFFECTED PRODUCTS

vendor:totolinkmodel:t8scope:eqversion:4.1.5cu.862_b20230228

Trust: 1.0

vendor:totolinkmodel:t8scope: - version: -

Trust: 0.8

vendor:totolinkmodel:t8scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:t8scope:eqversion:t8 firmware 4.1.5cu.862 b20230228

Trust: 0.8

vendor:totolinkmodel:ac1200 t8 4.1.5cu.862 b20230228scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-01815 // JVNDB: JVNDB-2024-007081 // NVD: CVE-2024-8079

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-8079
value: HIGH

Trust: 1.0

nvd@nist.gov: CVE-2024-8079
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2024-007081
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-01815
value: HIGH

Trust: 0.6

cna@vuldb.com: CVE-2024-8079
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

OTHER: JVNDB-2024-007081
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2025-01815
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2024-8079
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-8079
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2024-007081
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-01815 // JVNDB: JVNDB-2024-007081 // NVD: CVE-2024-8079 // NVD: CVE-2024-8079

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-007081 // NVD: CVE-2024-8079

EXTERNAL IDS

db:NVDid:CVE-2024-8079

Trust: 3.2

db:VULDBid:275561

Trust: 1.8

db:JVNDBid:JVNDB-2024-007081

Trust: 0.8

db:CNVDid:CNVD-2025-01815

Trust: 0.6

sources: CNVD: CNVD-2025-01815 // JVNDB: JVNDB-2024-007081 // NVD: CVE-2024-8079

REFERENCES

url:https://github.com/hawkteam404/rnd_public/blob/main/totolink_ac1200_t8_oscmdi_bof.md

Trust: 1.8

url:https://vuldb.com/?id.275561

Trust: 1.8

url:https://vuldb.com/?submit.390937

Trust: 1.8

url:https://www.totolink.net/

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-8079

Trust: 1.4

url:https://vuldb.com/?ctiid.275561

Trust: 1.0

sources: CNVD: CNVD-2025-01815 // JVNDB: JVNDB-2024-007081 // NVD: CVE-2024-8079

SOURCES

db:CNVDid:CNVD-2025-01815
db:JVNDBid:JVNDB-2024-007081
db:NVDid:CVE-2024-8079

LAST UPDATE DATE

2025-01-25T22:51:40.699000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-01815date:2025-01-20T00:00:00
db:JVNDBid:JVNDB-2024-007081date:2024-09-03T01:12:00
db:NVDid:CVE-2024-8079date:2024-12-13T14:53:21.583

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-01815date:2025-01-22T00:00:00
db:JVNDBid:JVNDB-2024-007081date:2024-09-03T00:00:00
db:NVDid:CVE-2024-8079date:2024-08-22T21:15:17.910