First published: Thu Aug 19 2021(Updated: )
In TP-Link Wireless N Router WR840N an ARP poisoning attack can cause buffer overflow
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr840n Firmware | ||
TP-LINK TL-WR840N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TP-Link Wireless N Router WR840N vulnerability is CVE-2021-29280.
The severity of CVE-2021-29280 is medium, with a CVSS score of 6.4.
An ARP poisoning attack in TP-Link Wireless N Router WR840N can cause a buffer overflow by manipulating the Address Resolution Protocol (ARP) to send malicious data that exceeds the buffer size, leading to a buffer overflow.
The affected software version of TP-Link Wireless N Router WR840N is Tp-link Tl-wr840n Firmware.
No, TP-Link TL-WR840N is not vulnerable to the ARP poisoning attack.
Yes, you can find more information about this vulnerability in the following references: [upgraded-ARP-Poisoning GitHub Repository](https://github.com/deadlysnowman3308/upgraded-ARP-Poisoning) and [Hacking Vila blog post](https://hackingvila.wordpress.com/2021/04/28/upgraded-arp-poisoning-tool/).
CVE-2021-29280 is associated with CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-668 (Exposure of Resource to Wrong Sphere).