First published: Wed Mar 09 2022(Updated: )
A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/get_reset_pwd_veirfy_code feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr886n Firmware | =20190826_2.3.8 | |
TP-Link TL-WR886N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44627 is a Buffer Overflow vulnerability that exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/get_reset_pwd_veirfy_code feature.
CVE-2021-44627 has a severity rating of 9.8 (critical).
The TP-LINK WR-886N 20190826 2.3.8 firmware is affected by CVE-2021-44627.
A malicious user can exploit CVE-2021-44627 by sending a crafted post request to the /cloud_config/router_post/get_reset_pwd_veirfy_code feature.
Currently, there is no known fix available for CVE-2021-44627. It is recommended to update to a patched version of the firmware when it becomes available.