Vulnerability Name: | CVE-2021-29302 (CCN-199752) | ||||||||||||
Assigned: | 2021-04-09 | ||||||||||||
Published: | 2021-04-09 | ||||||||||||
Updated: | 2021-04-21 | ||||||||||||
Summary: | TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution. | ||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) 7.3 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
8.8 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-120 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2021-29302 Source: XF Type: UNKNOWN tplink-cve202129302-bo(199752) Source: CCN Type: GitHub Web site Buffer 0verflow in TP-Link Devices Source: MISC Type: Exploit, Third Party Advisory https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 Source: MISC Type: Vendor Advisory https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot[210317-rel64474].zip Source: CCN Type: TP-Link Web site TP-Link TL-WR802N(US) and Archer_C50v5_US devices Source: MISC Type: Vendor Advisory https://www.tp-link.com/us/support/download/tl-wr802n/#Firmware | ||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||
BACK |