8.8
CWE
120 119
Advisory Published
Updated

CVE-2022-30024: Buffer Overflow

First published: Thu Jul 14 2022(Updated: )

A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Tp-link Tl-wr841 Firmware
TP-Link TL-WR841=10
TP-Link TL-WR841=11
TP-Link TL-WR841=12
Tp-link Tl-wr841n Firmware=3.16.9
TP-LINK TL-WR841N=12
Tp-link Tl-wr841n\(eu\) Firmware=160325
Tp-link Tl-wr841n\(eu\)=11
Tp-link Tl-wr841n Firmware=150616
TP-LINK TL-WR841N=11
Tp-link Tl-wr841n Firmware=150310
TP-LINK TL-WR841N=10
All of
Tp-link Tl-wr841 Firmware
Any of
TP-Link TL-WR841=10
TP-Link TL-WR841=11
TP-Link TL-WR841=12
All of
Tp-link Tl-wr841n Firmware=3.16.9
TP-LINK TL-WR841N=12
All of
Tp-link Tl-wr841n\(eu\) Firmware=160325
Tp-link Tl-wr841n\(eu\)=11
All of
Tp-link Tl-wr841n Firmware=150616
TP-LINK TL-WR841N=11
All of
Tp-link Tl-wr841n Firmware=150310
TP-LINK TL-WR841N=10

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID?

    The vulnerability ID is CVE-2022-30024.

  • What devices are affected by this vulnerability?

    The TP-Link TL-WR841N V12 devices with firmware version 3.16.9 are affected by this vulnerability.

  • How does this vulnerability occur?

    This vulnerability occurs due to a buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 devices.

  • What is the severity of CVE-2022-30024?

    The severity of CVE-2022-30024 is rated as high with a severity value of 8.8.

  • How can an attacker exploit this vulnerability?

    An authenticated remote attacker can exploit this vulnerability by sending a specially crafted GET request to the System Tools page of the Wi-Fi network.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203