First published: Fri Jun 16 2023(Updated: )
TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer Ax10 Firmware | =230220 | |
TP-Link Archer AX10 | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34832 is critical with a score of 9.8.
The affected software for CVE-2023-34832 is TP-Link Archer AX10(EU) firmware version 230220.
CVE-2023-34832 is a buffer overflow vulnerability in TP-Link Archer AX10(EU) firmware version 230220 via the function FUN_131e8 - 0x132B4.
At the moment, there are no known fixes or patches available for CVE-2023-34832. It is recommended to contact the vendor for further information.
More information about CVE-2023-34832 can be found at the following references: http://archer.com, http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html, http://tp-link.com.