TP-Link WR886N 3.0 1.0.1 Build 150127 Rel.34123n is vulnerable to Buffer Overflow. Authenticated attackers can crash router httpd services via /userRpm/PingIframeRpm.htm request which contains redundant & in parameter.
References
Link | Resource |
---|---|
https://github.com/zhlu32/cve/blob/main/tplink/wr886n/Tplink-wr886n-V3-Ping-DOS.md | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-02-08T14:23:26
Updated: 2022-02-08T14:23:26
Reserved: 2021-12-13T00:00:00
Link: CVE-2021-44864
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-08T15:15:07.597
Modified: 2022-02-11T16:53:35.627
Link: CVE-2021-44864
JSON object: View
Redhat Information
No data.
CWE