First published: Thu Jul 14 2022(Updated: )
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr841 Firmware | ||
TP-Link TL-WR841 | =10 | |
TP-Link TL-WR841 | =11 | |
TP-Link TL-WR841 | =12 | |
Tp-link Tl-wr841n Firmware | =3.16.9 | |
TP-LINK TL-WR841N | =12 | |
Tp-link Tl-wr841n\(eu\) Firmware | =160325 | |
Tp-link Tl-wr841n\(eu\) | =11 | |
Tp-link Tl-wr841n Firmware | =150616 | |
TP-LINK TL-WR841N | =11 | |
Tp-link Tl-wr841n Firmware | =150310 | |
TP-LINK TL-WR841N | =10 | |
All of | ||
Tp-link Tl-wr841 Firmware | ||
Any of | ||
TP-Link TL-WR841 | =10 | |
TP-Link TL-WR841 | =11 | |
TP-Link TL-WR841 | =12 | |
All of | ||
Tp-link Tl-wr841n Firmware | =3.16.9 | |
TP-LINK TL-WR841N | =12 | |
All of | ||
Tp-link Tl-wr841n\(eu\) Firmware | =160325 | |
Tp-link Tl-wr841n\(eu\) | =11 | |
All of | ||
Tp-link Tl-wr841n Firmware | =150616 | |
TP-LINK TL-WR841N | =11 | |
All of | ||
Tp-link Tl-wr841n Firmware | =150310 | |
TP-LINK TL-WR841N | =10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-30024.
The TP-Link TL-WR841N V12 devices with firmware version 3.16.9 are affected by this vulnerability.
This vulnerability occurs due to a buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 devices.
The severity of CVE-2022-30024 is rated as high with a severity value of 8.8.
An authenticated remote attacker can exploit this vulnerability by sending a specially crafted GET request to the System Tools page of the Wi-Fi network.