Stack-based buffer overflow in the httpd server of TP-Link WR1043nd (Firmware Version 3) allows remote attackers to execute arbitrary code via a malicious MediaServer request to /userRpm/MediaServerFoldersCfgRpm.htm.
References
Link | Resource |
---|---|
http://tp-link.com/ | Vendor Advisory |
https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day | Exploit Third Party Advisory |
http://tp-link.com/ | Vendor Advisory |
https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://tp-link.com/ - Vendor Advisory | |
References | () https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day - Exploit, Third Party Advisory |
Information
Published : 2019-06-20 16:15
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16119
Mitre link : CVE-2018-16119
CVE.ORG link : CVE-2018-16119
JSON object : View
Products Affected
tp-link
- tl-wr1043nd_firmware
- tl-wr1043nd
CWE
CWE-787
Out-of-bounds Write