First published: Tue Feb 08 2022(Updated: )
TP-Link WR886N 3.0 1.0.1 Build 150127 Rel.34123n is vulnerable to Buffer Overflow. Authenticated attackers can crash router httpd services via /userRpm/PingIframeRpm.htm request which contains redundant & in parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WN886N | =1.0.1-build_150127_rel.34123n | |
Tp-link Wn886n Firmware | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-44864 has been classified as a high severity vulnerability due to its potential to disrupt router services.
To fix CVE-2021-44864, you should immediately update the TP-Link WR886N firmware to the latest version provided by the manufacturer.
CVE-2021-44864 can allow authenticated attackers to crash the router's httpd service, resulting in a denial of service.
CVE-2021-44864 requires authentication, meaning only authorized users can exploit this vulnerability.
CVE-2021-44864 specifically affects the TP-Link WR886N 3.0 with firmware version 1.0.1 Build 150127 Rel.34123n.