First published: Wed Jun 07 2023(Updated: )
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a buffer overflow via the component /userRpm/FixMapCfgRpm.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr940n Firmware | ||
TP-Link TL-WR940N | =2.0 | |
TP-Link TL-WR940N | =4.0 | |
Tp-link Tl-wr841n Firmware | ||
TP-LINK TL-WR841N | =8.0 | |
TP-LINK TL-WR841N | =10.0 | |
Tp-link Tl-wr740n Firmware | ||
TP-Link TL-WR740N V6 | =1.0 | |
TP-Link TL-WR740N V6 | =2.0 | |
All of | ||
Tp-link Tl-wr940n Firmware | ||
Any of | ||
TP-Link TL-WR940N | =2.0 | |
TP-Link TL-WR940N | =4.0 | |
All of | ||
Tp-link Tl-wr841n Firmware | ||
Any of | ||
TP-LINK TL-WR841N | =8.0 | |
TP-LINK TL-WR841N | =10.0 | |
All of | ||
Tp-link Tl-wr740n Firmware | ||
Any of | ||
TP-Link TL-WR740N V6 | =1.0 | |
TP-Link TL-WR740N V6 | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33537 is a vulnerability found in TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 routers. It allows an attacker to execute arbitrary code or cause a denial of service.
CVE-2023-33537 has a severity rating of 8.1, which is categorized as high.
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 routers are affected by CVE-2023-33537.
An attacker can exploit CVE-2023-33537 by sending a specially crafted request to the /userRpm/FixMapCfgRpm component, which triggers a buffer overflow and allows the execution of arbitrary code.
To fix CVE-2023-33537, users should update their routers to the latest firmware version provided by TP-Link.