First published: Thu Jun 22 2023(Updated: )
TP-Link TL-WR940N V4 was discovered to contain a buffer overflow via the ipStart parameter at /userRpm/WanDynamicIpV6CfgRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr940n Firmware | ||
TP-Link TL-WR940N | =v4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36355 is a vulnerability found in TP-Link TL-WR940N V4 that allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
CVE-2023-36355 has a severity rating of 9.9 (critical).
The affected software of CVE-2023-36355 is TP-Link TL-WR940N V4 firmware.
At the moment, there is no official fix available for CVE-2023-36355. It is recommended to regularly check for firmware updates from TP-Link and apply them once they are released.
You can find more information about CVE-2023-36355 at the following references: - [Packet Storm Security](http://packetstormsecurity.com/files/173294/TP-Link-TL-WR940N-4-Buffer-Overflow.html) - [GitHub](https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/9/TP-Link%20TL-WR940N%20wireless%20router%20userRpmWanDynamicIpV6CfgRpm%20buffer%20write%20out-of-bounds%20vulnerability.md)