First published: Thu Jun 20 2019(Updated: )
Stack-based buffer overflow in the httpd server of TP-Link WR1043nd (Firmware Version 3) allows remote attackers to execute arbitrary code via a malicious MediaServer request to /userRpm/MediaServerFoldersCfgRpm.htm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr1043nd Firmware | =3.00 | |
TP-LINK TL-WR1043ND |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-16119.
CVE-2018-16119 has a severity level of 7.2 (critical).
The affected software for CVE-2018-16119 is TP-Link WR1043nd (Firmware Version 3).
Remote attackers can exploit CVE-2018-16119 by sending a malicious MediaServer request to /userRpm/MediaServerFoldersCfgRpm.htm on the TP-Link WR1043nd (Firmware Version 3) httpd server.
Yes, you can find references for CVE-2018-16119 at the following URLs: http://tp-link.com/ and https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0day.