Vulnerability CVE-2017-13772


Published: 2017-10-23   Modified: 2017-10-24

Description:
Multiple stack-based buffer overflows in TP-Link WR940N WiFi routers with hardware version 4 allow remote authenticated users to execute arbitrary code via the (1) ping_addr parameter to PingIframeRpm.htm or (2) dnsserver2 parameter to WanStaticIpV6CfgRpm.htm.

See advisories in our WLB2 database:
Topic
Author
Date
High
TP-Link WR940N - Authenticated Remote Code Exploit
Fidus infoSecuri...
21.10.2017
Med.
TP-Link WDR4300 Remote Code Execution
Patrik Lantz
31.08.2020

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9/10
10/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Tp-link -> Wr940n firmware 

 References:
https://www.exploit-db.com/exploits/43022/
https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/

Copyright 2024, cxsecurity.com

 

Back to Top