Critical Vulnerability Discovered in TP-Link VN020 F3v(T) TT_V6.2.1021 Due to Stack-Based Buffer Overflow

CVE-2024-11237
9.8CRITICAL

Key Information

Vendor
Tp-link
Status
Vn020 F3v(t)
Vendor
CVE Published:
15 November 2024

Summary

A vulnerability, which was classified as critical, has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected by this issue is some unknown functionality of the component DHCP DISCOVER Packet Parser. The manipulation of the argument hostname leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Affected Version(s)

VN020 F3v(T) = TT_V6.2.1021

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Risk change from: null to: 7.5 - (HIGH)

  • VulDB entry last update

  • Vulnerability Reserved.

  • VulDB entry created

  • Advisory disclosed

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database

Credit

Mohamed Maatallah (VulDB User)
.