PT-2021-6112 · Tp Link · Tp-Link Tl-Wr940N

Vadym Kolisnichenko

·

Published

2021-10-21

·

Updated

2022-02-28

·

CVE-2022-24355

CVSS v3.1

8.8

High

VectorAV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions TP-Link TL-WR940N version 3.20.1 Build 200316 Rel.34392n (5553)
Description This issue allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N routers. Authentication is not required to exploit this issue. The specific flaw exists within the parsing of file name extensions, resulting from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this issue to execute code in the context of root.
Recommendations For TP-Link TL-WR940N version 3.20.1 Build 200316 Rel.34392n (5553), as a temporary workaround, consider restricting access to the httpd service to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this issue.

Fix

Stack Overflow

Memory Corruption

Weakness Enumeration

Related Identifiers

BDU:2022-00858
CVE-2022-24355
ZDI-22-265

Affected Products

Tp-Link Tl-Wr940N