CVE-2021-29302

TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wr802n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr802n:v4:*:*:*:*:*:*:*

History

21 Nov 2024, 06:00

Type Values Removed Values Added
References () https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 - Exploit, Third Party Advisory () https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 - Exploit, Third Party Advisory
References () https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot%5B210317-rel64474%5D.zip - () https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot%5B210317-rel64474%5D.zip -
References () https://www.tp-link.com/us/support/download/tl-wr802n/#Firmware - Vendor Advisory () https://www.tp-link.com/us/support/download/tl-wr802n/#Firmware - Vendor Advisory

07 Nov 2023, 03:32

Type Values Removed Values Added
References
  • {'url': 'https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot[210317-rel64474].zip', 'name': 'https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot[210317-rel64474].zip', 'tags': ['Vendor Advisory'], 'refsource': 'MISC'}
  • () https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot%5B210317-rel64474%5D.zip -

Information

Published : 2021-04-12 19:15

Updated : 2024-11-21 06:00


NVD link : CVE-2021-29302

Mitre link : CVE-2021-29302

CVE.ORG link : CVE-2021-29302


JSON object : View

Products Affected

tp-link

  • tl-wr802n_firmware
  • tl-wr802n
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')