First published: Mon Oct 23 2017(Updated: )
Multiple stack-based buffer overflows in TP-Link WR940N WiFi routers with hardware version 4 allow remote authenticated users to execute arbitrary code via the (1) ping_addr parameter to PingIframeRpm.htm or (2) dnsserver2 parameter to WanStaticIpV6CfgRpm.htm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Wr940n Firmware | ||
TP-Link WR940N | =4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.