Remote Code Execution Vulnerability in TP-Link Archer A7 Firmware
CVE-2020-10881
9.8CRITICAL
Summary
A vulnerability in TP-Link Archer A7 routers enables remote attackers to execute arbitrary code by exploiting the handling of DNS responses. This can occur without any authentication, allowing potential intruders to craft a malicious DNS message that causes a buffer overflow in a fixed-length, stack-based buffer. By leveraging this vulnerability, an attacker may execute code with root user privileges, posing significant security risks to users of affected firmware versions.
Affected Version(s)
Archer A7 Firmware Ver: 190726
References
EPSS Score
41% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Pedro Ribeiro and Radek Domanski of Team Flashback