Key Information Product Information Vendor: TOTOLINK Affected Product: A3002RU Affected Firmware Version: V3.0.0_B20230809.1615 Vulnerability Overview Vulnerability Type: Buffer Overflow Trigger Method: Sending a malicious HTTP POST request to the path Impact: Attackers can exploit this vulnerability to launch a Denial of Service (DoS) attack Vulnerability Details Critical Code Snippet: - The function may cause a buffer overflow, as it does not check the size of the destination buffer. Buffer Overflow Location: POC (Proof of Concept) HTTP POST Request Example: Summary This screenshot reveals a severe buffer overflow vulnerability in the TOTOLINK A3002RU router running the specified firmware version. The vulnerability can be triggered by a specific HTTP POST request, potentially leading to a Denial of Service attack. The provided POC demonstrates how to construct a malicious request to exploit this vulnerability.