PT-2021-6112 · Tp Link · Tp-Link Tl-Wr940N
Vadym Kolisnichenko
·
Published
2021-10-21
·
Updated
2022-02-28
·
CVE-2022-24355
CVSS v3.1
8.8
High
| Vector | AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
TP-Link TL-WR940N version 3.20.1 Build 200316 Rel.34392n (5553)
Description
This issue allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N routers. Authentication is not required to exploit this issue. The specific flaw exists within the parsing of file name extensions, resulting from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this issue to execute code in the context of root.
Recommendations
For TP-Link TL-WR940N version 3.20.1 Build 200316 Rel.34392n (5553), as a temporary workaround, consider restricting access to the httpd service to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this issue.
Fix
Stack Overflow
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Tp-Link Tl-Wr940N