Arbitrary Code Execution Vulnerability in TP-Link Routers
CVE-2022-24973
6.8MEDIUM
Summary
This vulnerability affects TP-Link TL-WR940N routers, allowing network-adjacent attackers to execute arbitrary code on affected installations. The flaw occurs within the HTTP daemon (httpd) listening on TCP port 80, which fails to properly validate the length of user-supplied data before copying it to a fixed-length stack-based buffer. Although authentication is mandatory for exploitation, should an attacker succeed, they could execute arbitrary code with root privileges, posing significant risks to the device and connected network.
Affected Version(s)
TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553)
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Vadym Kolisnichenko