First published: Wed Mar 09 2022(Updated: )
A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/check_reg_verify_code function which could let a remove malicious user execute arbitrary code via a crafted post request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr886n Firmware | =20190826_2.3.8 | |
TP-Link TL-WR886N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-44622 is critical with a CVSS score of 9.8.
CVE-2021-44622 allows a remote malicious user to execute arbitrary code in TP-LINK WR-886N 20190826 2.3.8.
CVE-2021-44622 can be exploited by sending a crafted post request to the /cloud_config/router_post/check_reg_verify_code function.
No, TP-LINK TL-WR886N is not affected by CVE-2021-44622.
Yes, you can find more information about CVE-2021-44622 at the following link: https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkRegVeriRegister