First published: Thu Jun 22 2023(Updated: )
TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8, TL-WR941ND V5, and TL-WR740N V1/V2 were discovered to contain a buffer read out-of-bounds via the component /userRpm/VirtualServerRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link WR940N Firmware | ||
TP-Link TL-WR940N V2 Firmware | =v4 | |
TP-Link TL-WRN841N Firmware | ||
TP-Link TL-WR841ND Firmware | =v8 | |
TP-Link TL-WR740N | ||
TP-Link TL-WR740N V2 Firmware | =v1 | |
TP-Link TL-WR740N V2 Firmware | =v2 | |
TP-Link TL-WR940N V2 Firmware | =v2 | |
TP-Link TL-WR941ND V4 Firmware | ||
TP-Link TL-WR941ND V2 Firmware | =v5 | |
TP-Link TL-WR940N V2 Firmware | =v6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-36356.
TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8, TL-WR941ND V5, and TL-WR740N V1/V2 are affected by this vulnerability.
The severity of CVE-2023-36356 is high, with a severity value of 7.7.
An attacker can exploit this vulnerability by sending a crafted GET request to the /userRpm/VirtualServerRpm component, causing a Denial of Service (DoS).
Currently, there is no information available on a fix for CVE-2023-36356. It is recommended to follow the official advisories and security updates from TP-Link.