Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h8v9-4xr4-x4xq

Опубликовано: 15 июл. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.

A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.

EPSS

Процентиль: 94%
0.12304
Средний

8.8 High

CVSS3

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 8.8
nvd
больше 3 лет назад

A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.

CVSS3: 7.3
fstec
больше 3 лет назад

Уязвимость httpd-демона микропрограммного обеспечения маршрутизаторов TP-Link TL-WR841N, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 94%
0.12304
Средний

8.8 High

CVSS3

Дефекты

CWE-120