PT-2023-6591 · Tp Link · Tp-Link Tl-Wr886N

Published

2023-10-23

·

Updated

2024-09-11

·

CVE-2023-46536

CVSS v3.1
10
VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Name of the Vulnerable Software and Affected Versions:

TP-LINK TL-WR886N version 7.0 3.0.14 Build 221115 Rel.56908n.bin

Description:

The issue is related to a stack overflow in the `chkRegVeriRegister()` function, which can be exploited by a remote attacker to impact the integrity, availability, and confidentiality of protected information. This is a result of the function allowing an operation to exceed the buffer boundaries in memory.

Recommendations:

For TP-LINK TL-WR886N version 7.0 3.0.14 Build 221115 Rel.56908n.bin, consider disabling the `chkRegVeriRegister()` function as a temporary workaround until a patch is available. Restrict access to the vulnerable function to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Memory Corruption

Stack Overflow

Weakness Enumeration

Related Identifiers

BDU:2023-07357
CVE-2023-46536

Affected Products

Tp-Link Tl-Wr886N