First published: Thu Sep 13 2018(Updated: )
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for time_switch name.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Wr886n Firmware | =6.0_2.3.4 | |
Tp-link Wr886n Firmware | =7.0_1.1.0 | |
TP-Link TL-WR886N Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17018 is classified as a medium severity vulnerability that can lead to service disruption on affected TP-Link TL-WR886N devices.
CVE-2018-17018 affects TP-Link TL-WR886N devices running firmware versions 6.0_2.3.4 and 7.0_1.1.0.
To remediate CVE-2018-17018, update the TP-Link TL-WR886N firmware to the latest version provided by the manufacturer.
CVE-2018-17018 can be exploited by authenticated attackers who send long JSON data for the time_switch name to crash router services.
CVE-2018-17018 impacts router services including inetd, HTTP, DNS, and UPnP on the affected devices.