Remote Code Execution Vulnerability in TP-Link Archer A7 Firmware
CVE-2020-10881

9.8CRITICAL

Key Information:

Vendor
Tp-link
Status
Vendor
CVE Published:
25 March 2020

Summary

A vulnerability in TP-Link Archer A7 routers enables remote attackers to execute arbitrary code by exploiting the handling of DNS responses. This can occur without any authentication, allowing potential intruders to craft a malicious DNS message that causes a buffer overflow in a fixed-length, stack-based buffer. By leveraging this vulnerability, an attacker may execute code with root user privileges, posing significant security risks to users of affected firmware versions.

Affected Version(s)

Archer A7 Firmware Ver: 190726

References

EPSS Score

41% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Pedro Ribeiro and Radek Domanski of Team Flashback
.