First published: Thu Jun 22 2023(Updated: )
TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR740N V1/V2, TL-WR940N V2/V3, and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlTimeSchedRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr940n Firmware | ||
TP-Link TL-WR940N | =v4 | |
Tp-link Tl-wr841n Firmware | ||
TP-LINK TL-WR841N | =v8 | |
TP-LINK TL-WR841N | =v10 | |
Tp-link Tl-wr740n Firmware | ||
TP-Link TL-WR740N | =v1 | |
TP-Link TL-WR740N | =v2 | |
TP-Link TL-WR940N | =v2 | |
TP-Link TL-WR940N | =v3 | |
Tp-link Tl-wr941nd Firmware | ||
Tp-link Tl-wr941nd | =v5 | |
Tp-link Tl-wr941nd | =v6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36354 is a buffer overflow vulnerability found in TP-Link TL-WR940N, TL-WR841N, TL-WR740N, and TL-WR941ND routers.
CVE-2023-36354 has a severity rating of 7.5 (High).
CVE-2023-36354 does not affect TP-Link TL-WR940N V4.
To fix CVE-2023-36354, it is recommended to update to the latest firmware provided by TP-Link.
You can find more information about CVE-2023-36354 at the following link: https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/7/TL-WR940N_TL-WR841N_TL-WR740N_TL-WR941ND_userRpm_AccessCtrlTimeSchedRpm.md