First published: Thu May 11 2023(Updated: )
A vulnerability has been found in TP-Link Archer C7v2 v2_en_us_180114 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component GET Request Parameter Handler. The manipulation leads to denial of service. The attack can only be done within the local network. The associated identifier of this vulnerability is VDB-228775. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C7 Firmware | =180114 | |
TP-Link Archer C7 | =2.0 | |
All of | ||
=180114 | ||
=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2646 is a vulnerability found in the TP-Link Archer C7v2 router that allows an attacker to perform a denial of service attack by manipulating the GET request parameters.
The severity of the CVE-2023-2646 vulnerability is rated as medium with a severity value of 6.5.
The TP-Link Archer C7v2 firmware version 180114 is affected by the CVE-2023-2646 vulnerability.
An attacker can exploit the CVE-2023-2646 vulnerability by performing a denial of service attack using manipulated GET request parameters within the local network.
No, the TP-Link Archer C7 router version 2.0 is not affected by the CVE-2023-2646 vulnerability.