TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR740N V1/V2, TL-WR940N V2/V3, and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlTimeSchedRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
References
Link | Resource |
---|---|
https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md | Exploit Third Party Advisory |
https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
History
21 Nov 2024, 08:09
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md - Exploit, Third Party Advisory |
29 Jun 2023, 20:45
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-120 | |
First Time |
Tp-link tl-wr940n
Tp-link tl-wr941nd Tp-link tl-wr740n Firmware Tp-link Tp-link tl-wr841n Firmware Tp-link tl-wr841n Tp-link tl-wr941nd Firmware Tp-link tl-wr940n Firmware Tp-link tl-wr740n |
|
References | (MISC) https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:tp-link:tl-wr941nd:v5:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr941nd_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr941nd:v6:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr940n:v2:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr740n_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr740n:v1:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr841n:v8:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr940n:v3:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr841n:v10:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr740n:v2:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
22 Jun 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-22 20:15
Updated : 2024-11-21 08:09
NVD link : CVE-2023-36354
Mitre link : CVE-2023-36354
CVE.ORG link : CVE-2023-36354
JSON object : View
Products Affected
tp-link
- tl-wr940n_firmware
- tl-wr941nd_firmware
- tl-wr740n
- tl-wr940n
- tl-wr941nd
- tl-wr841n_firmware
- tl-wr841n
- tl-wr740n_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')