A Buffer Overflow vulnerabiltiy exists in TP-LINK WR-886N 20190826 2.3.8 in thee /cloud_config/router_post/login feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
References
Link | Resource |
---|---|
https://github.com/Yu3H0/IoT_CVE/tree/main/886N/loginRegister | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Mar 2022, 04:22
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CWE | CWE-120 | |
References | (MISC) https://github.com/Yu3H0/IoT_CVE/tree/main/886N/loginRegisterĀ - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:tp-link:tl-wr886n_firmware:20190826_2.3.8:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr886n:-:*:*:*:*:*:*:* |
10 Mar 2022, 17:54
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-03-10 17:44
Updated : 2024-02-04 22:29
NVD link : CVE-2021-44628
Mitre link : CVE-2021-44628
CVE.ORG link : CVE-2021-44628
JSON object : View
Products Affected
tp-link
- tl-wr886n_firmware
- tl-wr886n
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')