TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
References
Link | Resource |
---|---|
https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 | Exploit Third Party Advisory |
https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot%5B210317-rel64474%5D.zip | |
https://www.tp-link.com/us/support/download/tl-wr802n/#Firmware | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2021-04-12T17:47:02
Updated: 2021-04-12T18:32:08
Reserved: 2021-03-29T00:00:00
Link: CVE-2021-29302
JSON object: View
NVD Information
Status : Modified
Published: 2021-04-12T19:15:14.580
Modified: 2023-11-07T03:32:34.590
Link: CVE-2021-29302
JSON object: View
Redhat Information
No data.
CWE