Описание
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2023-30383
- https://gist.github.com/a2ure123/a4eda2813d85d8b414bb87e855ab4bf8
- https://www.tp-link.com/us/support/download/archer-c2/v1/#Firmware
- https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware
- https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware%29%2CTPLINK
- https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware),TPLINK
- http://tplink.com
Связанные уязвимости
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
Уязвимость микропрограммного обеспечения Wi‑Fi роутеров TP-Link Archer C50, Archer C20 и Archer C2, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании