LBT T300-T390 v2.2.1.8 were discovered to contain a stack overflow via the ApCliSsid parameter in the updateCurAPlist function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
References
| Link | Resource |
|---|---|
| https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md | Exploit Third Party Advisory |
| https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/updateCurAPlist.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2024-03-01 14:15
Updated : 2025-04-30 11:26
NVD link : CVE-2024-27572
Mitre link : CVE-2024-27572
CVE.ORG link : CVE-2024-27572
JSON object : View
Products Affected
libtor
- lbt-t300-t390_firmware
- lbt-t300-t390
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
