First published: Wed Nov 18 2020(Updated: )
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wpa4220 Firmware | ||
TP-Link TL-WPA4220 | =v2 | |
TP-Link TL-WPA4220 | =v3 | |
Tp-link Tl-wpa4220 Firmware | <tl-wpa4220\(eu\)_v4_201023 | |
TP-Link TL-WPA4220 | =v4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.