Buffer Overflow in TP-Link Routers Exposing User Access Control
CVE-2023-36354
7.5HIGH
Summary
Several TP-Link router models have been found to contain a buffer overflow vulnerability in the /userRpm/AccessCtrlTimeSchedRpm component. This weakness allows attackers to craft specific GET requests that can lead to a Denial of Service (DoS), potentially disrupting network access and performance for legitimate users. Home and small office users of affected TP-Link devices should ensure that their firmware is up to date to mitigate the risk.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved