A Buffer Overflow vulnerabilitiy exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/register feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
References
Link | Resource |
---|---|
https://github.com/Yu3H0/IoT_CVE/tree/main/886N/registerRegister | Exploit Third Party Advisory |
https://github.com/Yu3H0/IoT_CVE/tree/main/886N/registerRegister | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Yu3H0/IoT_CVE/tree/main/886N/registerRegisterĀ - Exploit, Third Party Advisory |
Information
Published : 2022-03-10 17:44
Updated : 2024-11-21 06:31
NVD link : CVE-2021-44629
Mitre link : CVE-2021-44629
CVE.ORG link : CVE-2021-44629
JSON object : View
Products Affected
tp-link
- tl-wr886n
- tl-wr886n_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')