A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.
References
Link | Resource |
---|---|
http://tl-wr841.com | Broken Link URL Repurposed |
http://tp-link.com | Vendor Advisory |
https://pastebin.com/0XRFr3zE | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-07-14T13:41:42
Updated: 2022-07-14T13:41:42
Reserved: 2022-05-02T00:00:00
Link: CVE-2022-30024
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-14T14:15:13.277
Modified: 2024-02-14T01:17:43.863
Link: CVE-2022-30024
JSON object: View
Redhat Information
No data.
CWE