Логотип exploitDog
bind:CVE-2024-12343
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-12343

Количество 3

Количество 3

nvd логотип

CVE-2024-12343

около 1 года назад

A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-w44f-qrgh-jh53

около 1 года назад

A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-11021

около 1 года назад

Уязвимость обработчика SOAP-запросов микропрограммного обеспечения Wi‑Fi роутеров TP-Link VN020 F3v(T), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-12343

A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 6.5
8%
Низкий
около 1 года назад
github логотип
GHSA-w44f-qrgh-jh53

A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

CVSS3: 6.5
8%
Низкий
около 1 года назад
fstec логотип
BDU:2024-11021

Уязвимость обработчика SOAP-запросов микропрограммного обеспечения Wi‑Fi роутеров TP-Link VN020 F3v(T), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.8
8%
Низкий
около 1 года назад

Уязвимостей на страницу