Buffer Overflow Vulnerability in TP-Link VN020 F3v(T) SOAP Request Handler
CVE-2024-12343

8.8HIGH

Key Information:

Vendor
Tp-link
Vendor
CVE Published:
8 December 2024

Badges

πŸ‘Ύ Exploit Exists

Summary

CVE-2024-12343 identifies a critical buffer overflow vulnerability in the TP-Link VN020 F3v(T) TT_V6.2.1021 associated with the SOAP Request Handler's /control/WANIPConnection endpoint. This vulnerability can be exploited by manipulating the NewConnectionType argument, potentially allowing attackers within the local network to execute arbitrary code or cause a denial of service (DoS). As the exploit has been disclosed publicly, it emphasizes the urgency for users and network administrators to apply necessary patches and mitigate risks associated with this critical vulnerability.

Affected Version(s)

VN020 F3v(T) TT_V6.2.1021

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mohamed Maatallah (VulDB User)
.