ID

VAR-202405-4083


CVE

CVE-2024-35099


TITLE

TOTOLINK  of  lr350  Classic buffer overflow vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2024-023278

DESCRIPTION

TOTOLINK LR350 V9.3.5u.6698_B20230810 was discovered to contain a stack overflow via the password parameter in the function loginAuth. TOTOLINK of lr350 Firmware has a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The TOTOLINK LR350 is a 4G LTE router released by China's TOTOLINK Electronics. It converts 4G signals into wired signals and is suitable for home and office use. The TOTOLINK LR350 suffers from a buffer overflow vulnerability. This vulnerability stems from the failure to properly validate the length of the input data in the password parameter of the loginAuth function. An attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service

Trust: 2.16

sources: NVD: CVE-2024-35099 // JVNDB: JVNDB-2024-023278 // CNVD: CNVD-2025-17698

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2025-17698

AFFECTED PRODUCTS

vendor:totolinkmodel:lr350scope:eqversion:9.3.5u.6698_b20230810

Trust: 1.0

vendor:totolinkmodel:lr350scope: - version: -

Trust: 0.8

vendor:totolinkmodel:lr350scope:eqversion:lr350 firmware 9.3.5u.6698 b20230810

Trust: 0.8

vendor:totolinkmodel:lr350scope:eqversion: -

Trust: 0.8

vendor:totolinkmodel:lr350 9.3.5u.6698 b20230810scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2025-17698 // JVNDB: JVNDB-2024-023278 // NVD: CVE-2024-35099

CVSS

SEVERITY

CVSSV2

CVSSV3

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-35099
value: CRITICAL

Trust: 1.0

OTHER: JVNDB-2024-023278
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2025-17698
value: HIGH

Trust: 0.6

CNVD: CNVD-2025-17698
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2024-35099
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

OTHER: JVNDB-2024-023278
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2025-17698 // JVNDB: JVNDB-2024-023278 // NVD: CVE-2024-35099

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

problemtype:Classic buffer overflow (CWE-120) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-023278 // NVD: CVE-2024-35099

EXTERNAL IDS

db:NVDid:CVE-2024-35099

Trust: 3.2

db:JVNDBid:JVNDB-2024-023278

Trust: 0.8

db:CNVDid:CNVD-2025-17698

Trust: 0.6

sources: CNVD: CNVD-2025-17698 // JVNDB: JVNDB-2024-023278 // NVD: CVE-2024-35099

REFERENCES

url:https://github.com/s4ndw1ch136/iot-vuln-reports/blob/main/v9.3.5u.6698_b20230810/readme.md

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2024-35099

Trust: 0.8

sources: CNVD: CNVD-2025-17698 // JVNDB: JVNDB-2024-023278 // NVD: CVE-2024-35099

SOURCES

db:CNVDid:CNVD-2025-17698
db:JVNDBid:JVNDB-2024-023278
db:NVDid:CVE-2024-35099

LAST UPDATE DATE

2025-08-09T23:18:40.896000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2025-17698date:2025-08-07T00:00:00
db:JVNDBid:JVNDB-2024-023278date:2025-05-07T02:44:00
db:NVDid:CVE-2024-35099date:2025-05-05T17:09:33.593

SOURCES RELEASE DATE

db:CNVDid:CNVD-2025-17698date:2025-08-07T00:00:00
db:JVNDBid:JVNDB-2024-023278date:2025-05-07T00:00:00
db:NVDid:CVE-2024-35099date:2024-05-14T15:39:39.483