8.8

CVE-2022-30024

A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tp-linkTl-wr841 Firmware Version-
   Tp-linkTl-wr841 Version10
   Tp-linkTl-wr841 Version11
   Tp-linkTl-wr841 Version12
Tp-linkTl-wr841n Firmware Version3.16.9
   Tp-linkTl-wr841n Version12
Tp-linkTl-wr841n(eu) Firmware Version160325
   Tp-linkTl-wr841n(eu) Version11
Tp-linkTl-wr841n Firmware Version150616
   Tp-linkTl-wr841n Version11
Tp-linkTl-wr841n Firmware Version150310
   Tp-linkTl-wr841n Version10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 12.3% 0.936
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.