ID

VAR-202401-2676


CVE

CVE-2024-22662


TITLE

TOTOLINK A3700R setParentalRules method buffer overflow vulnerability

Trust: 0.6

sources: CNVD: CNVD-2025-15329

DESCRIPTION

TOTOLINK A3700R_V9.1.2u.6165_20211012 has a stack overflow vulnerability via setParentalRules. TOTOLINK A3700R is a wireless router produced by China's TOTOLINK Electronics. The vulnerability is caused by the setParentalRules method failing to properly verify the length of the input data. Attackers can exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 1.44

sources: NVD: CVE-2024-22662 // CNVD: CNVD-2025-15329

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-15329

AFFECTED PRODUCTS

vendor:totolinkmodel:a3700rscope:eqversion:9.1.2u.6165_20211012

Trust: 1.0

vendor:totolinkmodel:a3700r v9.1.2u.6165 20211012scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-15329 // NVD: CVE-2024-22662

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2024-22662
value: CRITICAL

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-22662
value: CRITICAL

Trust: 1.0

CNVD: CNVD-2025-15329
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-15329
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2024-22662
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 2.0

sources: CNVD: CNVD-2025-15329 // NVD: CVE-2024-22662 // NVD: CVE-2024-22662

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.0

sources: NVD: CVE-2024-22662

EXTERNAL IDS

db:NVDid:CVE-2024-22662

Trust: 1.6

db:CNVDid:CNVD-2025-15329

Trust: 0.6

sources: CNVD: CNVD-2025-15329 // NVD: CVE-2024-22662

REFERENCES

url:https://github.com/covteam/iot_vuln/tree/main/setparentalrules

Trust: 1.6

sources: CNVD: CNVD-2025-15329 // NVD: CVE-2024-22662

SOURCES

db:CNVDid:CNVD-2025-15329
db:NVDid:CVE-2024-22662

LAST UPDATE DATE

2025-07-10T22:53:26.551000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-15329date:2025-07-09T00:00:00
db:NVDid:CVE-2024-22662date:2025-06-20T20:15:29.990

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-15329date:2025-07-09T00:00:00
db:NVDid:CVE-2024-22662date:2024-01-23T15:15:11.913