First published: Sat Nov 13 2021(Updated: )
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr840n Firmware | <=tl-wr840n\(eu\)_v5_171211 | |
TP-LINK TL-WR840N | =v5 | |
All of | ||
Tp-link Tl-wr840n Firmware | <=tl-wr840n\(eu\)_v5_171211 | |
TP-LINK TL-WR840N | =v5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41653 is a vulnerability in the PING function on the TP-Link TL-WR840N EU v5 router that allows remote code execution.
CVE-2021-41653 has a severity rating of 9.8, which is considered critical.
The TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is affected by CVE-2021-41653.
CVE-2021-41653 can be exploited by sending a crafted payload in an IP address input field.
Please refer to the TP-Link security advisory for instructions on how to mitigate CVE-2021-41653.