TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 - Exploit, Third Party Advisory | |
References | () https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot%5B210317-rel64474%5D.zip - | |
References | () https://www.tp-link.com/us/support/download/tl-wr802n/#Firmware - Vendor Advisory |
07 Nov 2023, 03:32
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-04-12 19:15
Updated : 2024-11-21 06:00
NVD link : CVE-2021-29302
Mitre link : CVE-2021-29302
CVE.ORG link : CVE-2021-29302
JSON object : View
Products Affected
tp-link
- tl-wr802n_firmware
- tl-wr802n
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')