Description
A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Problem types
Product status
1.2.1
1.2.2
1.2.3
1.2.4
1.2.5
1.2.6
1.2.7
1.2.8
Timeline
| 2026-05-02: | Advisory disclosed |
| 2026-05-02: | VulDB entry created |
| 2026-05-02: | VulDB entry last update |
Credits
kunlun (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/360828 (VDB-360828 | Shenzhen Libituo Technology LBT-T300-HW1 apply.cgi start_lan buffer overflow)
vuldb.com/vuln/360828/cti (VDB-360828 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/800708 (Submit #800708 | Libtor Technology lbt-t300-hw1 <=V1.2.8 Buffer Overflow)
vuldb.com/submit/800709 (Submit #800709 | Libtor Technology <=V1.2.8 Buffer Overflow (Duplicate))
github.com/…hw1/blob/main/generate_conf_router(Channel).md
