Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pjrc-7xrw-gxwr

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.8

Описание

An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single authenticated HTTP request to trigger this vulnerability.

An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single authenticated HTTP request to trigger this vulnerability.

EPSS

Процентиль: 88%
0.03929
Низкий

8.8 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.8
nvd
около 7 лет назад

An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single authenticated HTTP request to trigger this vulnerability.

CVSS3: 8.8
fstec
около 7 лет назад

Уязвимость реализации диагностических функций ping и tracert микропрограммного обеспечения VPN-маршрутизаторов TP-Link TL-R600VPN, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 88%
0.03929
Низкий

8.8 High

CVSS3

Дефекты

CWE-787