First published: Mon Apr 12 2021(Updated: )
TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr802n Firmware | <=2020.06 | |
TP-Link TL-WR802N | =v4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29302 is a buffer overflow vulnerability in TP-Link TL-WR802N(US) Archer_C50v5_US v4_200 <= 2020.06.
The severity of CVE-2021-29302 is critical with a CVSS score of 8.1.
The affected software of CVE-2021-29302 is TP-Link TL-WR802N(US) firmware version 2020.06.
An attacker can exploit CVE-2021-29302 by sending a message through the network to the router, potentially leading to remote code execution.
Yes, a fix for CVE-2021-29302 is available. Users can download the firmware update from the TP-Link website.