PT-2023-6591 · Tp Link · Tp-Link Tl-Wr886N
Published
2023-10-23
·
Updated
2024-09-11
·
CVE-2023-46536
Published
2023-10-23
·
Updated
2024-09-11
·
CVE-2023-46536
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions:
TP-LINK TL-WR886N version 7.0 3.0.14 Build 221115 Rel.56908n.bin
Description:
The issue is related to a stack overflow in the `chkRegVeriRegister()` function, which can be exploited by a remote attacker to impact the integrity, availability, and confidentiality of protected information. This is a result of the function allowing an operation to exceed the buffer boundaries in memory.
Recommendations:
For TP-LINK TL-WR886N version 7.0 3.0.14 Build 221115 Rel.56908n.bin, consider disabling the `chkRegVeriRegister()` function as a temporary workaround until a patch is available. Restrict access to the vulnerable function to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
Memory Corruption
Stack Overflow