Stack-based Buffer Overflow in TP-Link WR1043nd Firmware
CVE-2018-16119
7.2HIGH
Key Information:
- Vendor
- Tp-link
- Status
- Vendor
- CVE Published:
- 20 June 2019
Badges
👾 Exploit Exists🟡 Public PoC
Summary
A stack-based buffer overflow vulnerability exists in the HTTP server of TP-Link WR1043nd, specifically in Firmware Version 3. This flaw enables remote attackers to execute arbitrary code by sending specifically crafted MediaServer requests to the affected device. Exploitation of this vulnerability can lead to unauthorized access and control over the device, compromising its integrity and potentially jeopardizing network security.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability Reserved