TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
References
Link | Resource |
---|---|
https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-29302 | Exploit Third Party Advisory |
https://static.tp-link.com/beta/2021/202103/20210319/TL-WR802Nv4_US_0.9.1_3.17_up_boot[210317-rel64474].zip | Vendor Advisory |
https://www.tp-link.com/us/support/download/tl-wr802n/#Firmware | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-04-12 12:15
Updated : 2021-04-21 09:42
NVD link : CVE-2021-29302
Mitre link : CVE-2021-29302
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
tp-link
- tl-wr802n
- tl-wr802n_firmware