First published: Thu Jun 30 2022(Updated: )
A stack overflow in the function DM_ In fillobjbystr() of TP-Link Archer C50&A5(US)_V5_200407 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer A5 Firmware | =c50\&a5\(us\)_v5_200407 | |
Tp-link Archer A5 | =5 | |
Tp-link Archer C50 Firmware | =c50\&a5\(us\)_v5_200407 | |
TP-LINK Archer C50 | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33087 is a vulnerability in the TP-Link Archer C50&A5(US)_V5_200407 firmware that allows attackers to cause a Denial of Service (DoS) through a stack overflow in the DM_ In fillobjbystr() function via a crafted HTTP request.
CVE-2022-33087 has a severity rating of 7.5 (high).
The TP-Link Archer A5 firmware version c50&a5(us)_v5_200407 is affected by CVE-2022-33087.
CVE-2022-33087 can be exploited by sending a crafted HTTP request to the affected TP-Link Archer C50&A5(US)_V5_200407 firmware, triggering a stack overflow in the DM_ In fillobjbystr() function and causing a Denial of Service (DoS) condition.
Yes, the TP-Link Archer C50 firmware version c50&a5(us)_v5_200407 is affected by CVE-2022-33087.