TP-Link Archer AX21 tdpServer Logging Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-27332
8.8HIGH
Summary
A vulnerability affecting the TP-Link Archer AX21 router exists within the tdpServer logging functionality, which is prone to a stack-based buffer overflow due to inadequate length validation of user-supplied data. This flaw allows network-adjacent attackers to gain unauthorized remote access and execute arbitrary code within the root context. The tdpServer process listens on UDP port 20002, exposing this critical weakness to exploitation without any authentication requirements, making devices particularly vulnerable.
Affected Version(s)
Archer AX21 1.1.3 Build 20221125
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved