CWE
120 119
Advisory Published
Updated

CVE-2020-28877: Buffer Overflow

First published: Fri Nov 20 2020(Updated: )

Buffer overflow in in the copy_msg_element function for the devDiscoverHandle server in the TP-Link WR and WDR series, including WDR7400, WDR7500, WDR7660, WDR7800, WDR8400, WDR8500, WDR8600, WDR8620, WDR8640, WDR8660, WR880N, WR886N, WR890N, WR890N, WR882N, and WR708N.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Tp-link Wdr7400 Firmware
Tp-link Wdr7400 Firmware
Tp-link Wdr7500 Firmware
TP-Link WDR7500
Tp-link Tl-wdr7660 Firmware
Tp-link Wdr7660 Firmware
TP-Link WDR7800 Firmware
TP-Link WDR7800 Firmware
Tp-link Wdr8400 Firmware
TP-Link WDR8400
Tp-link Wdr8500 Firmware
TP-Link WDR8500
TP-Link WDR8600 Firmware
TP-Link WDR8600
TP-Link WDR8620
Tp-link Wdr8620 Firmware
Tp-link Wdr8640 Firmware
TP-Link WDR8640
Tp-link Wdr8660 Firmware
TP-Link WDR8660
TP-Link WR880N Firmware
TP-Link WR880N Firmware
TP-Link TL-WR886N Firmware
TP-Link TL-WR886N
TP-Link WR890N Firmware
TP-Link WR890N Firmware
TP-Link WR882N Firmware
TP-Link WR882N
TP-Link WR708N
TP-Link WR708N

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203