Critical Buffer Overflow Vulnerability in TP-Link VN020 F3v(T) TT_V6.2.1021 Could Allow for Remote Code Execution

CVE-2024-12343

8.8HIGH

Key Information

Vendor
Tp-link
Status
Vn020 F3v(t)
Vendor
CVE Published:
8 December 2024

Summary

A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.

Affected Version(s)

VN020 F3v(T) = TT_V6.2.1021

Refferences

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database

Credit

Mohamed Maatallah (VulDB User)
.