ID

VAR-202409-0760


CVE

CVE-2024-46451


TITLE

TOTOLINK  of  T8  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-008366

DESCRIPTION

TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWiFiAclRules function via the desc parameter. TOTOLINK of T8 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. TOTOLINK AC1200 T8 is a dual-band full-gigabit router from China's TOTOLINK Electronics. The vulnerability is caused by the desc parameter of the setWiFiAclRules function failing to correctly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2024-46451 // JVNDB: JVNDB-2024-008366 // CNVD: CNVD-2025-00878

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-00878

AFFECTED PRODUCTS

vendor:totolinkmodel:t8scope:eqversion:4.1.5cu.861_b20230220

Trust: 1.0

vendor:totolinkmodel:t8scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:t8scope: - version: -

Trust: 0.8

vendor:totolinkmodel:t8scope:eqversion:t8 firmware 4.1.5cu.861 b20230220

Trust: 0.8

vendor:totolinkmodel:ac1200 t8 4.1.5cu.861 b20230220scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-00878 // JVNDB: JVNDB-2024-008366 // NVD: CVE-2024-46451

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-46451
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-46451
value: CRITICAL

Trust: 1.0

NVD: CVE-2024-46451
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-00878
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-00878
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-46451
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2024-46451
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-00878 // JVNDB: JVNDB-2024-008366 // NVD: CVE-2024-46451 // NVD: CVE-2024-46451

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [NVD evaluation ]

Trust: 0.8

problemtype: Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-008366 // NVD: CVE-2024-46451

EXTERNAL IDS

db:NVDid:CVE-2024-46451

Trust: 3.2

db:JVNDBid:JVNDB-2024-008366

Trust: 0.8

db:CNVDid:CNVD-2025-00878

Trust: 0.6

sources: CNVD: CNVD-2025-00878 // JVNDB: JVNDB-2024-008366 // NVD: CVE-2024-46451

REFERENCES

url:https://github.com/offshore0315/lot-vulnerable/blob/main/totolink/ac1200%20t8/setwifiaclrules.md

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-46451

Trust: 1.4

sources: CNVD: CNVD-2025-00878 // JVNDB: JVNDB-2024-008366 // NVD: CVE-2024-46451

SOURCES

db:CNVDid:CNVD-2025-00878
db:JVNDBid:JVNDB-2024-008366
db:NVDid:CVE-2024-46451

LAST UPDATE DATE

2025-01-11T23:33:22.290000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-00878date:2025-01-10T00:00:00
db:JVNDBid:JVNDB-2024-008366date:2024-09-18T09:25:00
db:NVDid:CVE-2024-46451date:2024-09-17T14:35:31.353

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-00878date:2025-01-10T00:00:00
db:JVNDBid:JVNDB-2024-008366date:2024-09-18T00:00:00
db:NVDid:CVE-2024-46451date:2024-09-16T13:15:10.847