Количество 3
Количество 3
CVE-2018-3951
An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability.
GHSA-9r6w-5369-47xv
An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability.
BDU:2019-04737
Уязвимость функции синтаксического анализа HTTP-заголовка микропрограммного обеспечения VPN-маршрутизаторов TP-Link TL-R600VPN, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2018-3951 An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. | CVSS3: 7.2 | 8% Низкий | около 7 лет назад | |
GHSA-9r6w-5369-47xv An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. | CVSS3: 7.2 | 8% Низкий | больше 3 лет назад | |
BDU:2019-04737 Уязвимость функции синтаксического анализа HTTP-заголовка микропрограммного обеспечения VPN-маршрутизаторов TP-Link TL-R600VPN, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.2 | 8% Низкий | около 7 лет назад |
Уязвимостей на страницу