First published: Thu Sep 13 2018(Updated: )
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g bandwidth.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR886N | =6.0_2.3.4 | |
TP-Link TL-WR886N | =7.0_1.1.0 | |
TP-Link TL-WR886N Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17010 is a vulnerability discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices that allows authenticated attackers to crash router services via long JSON data for wireless wlan_host_2g bandwidth.
CVE-2018-17010 affects TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices by allowing authenticated attackers to crash router services.
CVE-2018-17010 has a severity rating of 6.5 (medium).
To fix CVE-2018-17010, TP-Link TL-WR886N users should update their firmware to a version that includes a patch for this vulnerability.
You can find more information about CVE-2018-17010 on the GitHub repository of PAGalaxyLab, which includes a README file detailing the vulnerability.