First published: Wed Mar 09 2022(Updated: )
A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/upgrade_info feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr886n Firmware | =20190826_2.3.8 | |
TP-Link TL-WR886N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44632 is a Buffer Overflow vulnerability that exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/upgrade_info feature.
The severity of CVE-2021-44632 is critical with a CVSS score of 9.8.
CVE-2021-44632 allows malicious users to execute arbitrary code on TP-LINK WR-886N 20190826 2.3.8 via a crafted post request to the /cloud_config/router_post/upgrade_info feature.
There is currently no official fix for CVE-2021-44632. It is recommended to update to the latest firmware version provided by TP-LINK once it becomes available.
Yes, you can find more information about CVE-2021-44632 at the following URL: https://github.com/Yu3H0/IoT_CVE/tree/main/886N/upgradeInfoRegister