Описание
TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
Ссылки
- ExploitThird Party Advisory
- Vendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2020.06 (включая)
Одновременно
cpe:2.3:o:tp-link:tl-wr802n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr802n:v4:*:*:*:*:*:*:*
EPSS
Процентиль: 93%
0.10093
Средний
8.1 High
CVSS3
9.3 Critical
CVSS2
Дефекты
CWE-120
Связанные уязвимости
github
больше 3 лет назад
TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
EPSS
Процентиль: 93%
0.10093
Средний
8.1 High
CVSS3
9.3 Critical
CVSS2
Дефекты
CWE-120