The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
References
Link | Resource |
---|---|
http://tp-link.com | Vendor Advisory |
https://k4m1ll0.com/cve-2021-41653.html | Exploit Third Party Advisory |
https://www.tp-link.com/us/press/security-advisory/ | Vendor Advisory |
http://tp-link.com | Vendor Advisory |
https://k4m1ll0.com/cve-2021-41653.html | Exploit Third Party Advisory |
https://www.tp-link.com/us/press/security-advisory/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://tp-link.com - Vendor Advisory | |
References | () https://k4m1ll0.com/cve-2021-41653.html - Exploit, Third Party Advisory | |
References | () https://www.tp-link.com/us/press/security-advisory/ - Vendor Advisory |
Information
Published : 2021-11-13 15:15
Updated : 2024-11-21 06:26
NVD link : CVE-2021-41653
Mitre link : CVE-2021-41653
CVE.ORG link : CVE-2021-41653
JSON object : View
Products Affected
tp-link
- tl-wr840n_firmware
- tl-wr840n
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')