Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-77gh-mcmc-pvr3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.

TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.

EPSS

Процентиль: 93%
0.10093
Средний

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 8.1
nvd
почти 5 лет назад

TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.

EPSS

Процентиль: 93%
0.10093
Средний

Дефекты

CWE-120