First published: Thu Jun 22 2023(Updated: )
TP-Link TL-WR940N V2/V3/V4, TL-WR941ND V5/V6, TL-WR743ND V1 and TL-WR841N V8 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlAccessTargetsRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr940n Firmware | ||
TP-Link TL-WR940N | =v4 | |
Tp-link Tl-wr841n Firmware | ||
TP-LINK TL-WR841N | =v8 | |
TP-Link TL-WR940N | =v2 | |
TP-Link TL-WR940N | =v3 | |
Tp-link Tl-wr941nd Firmware | ||
Tp-link Tl-wr941nd | =v5 | |
Tp-link Tl-wr941nd | =v6 | |
Tp-link Tl-wr743nd Firmware | ||
Tp-link Tl-wr743nd | =v1 | |
All of | ||
Tp-link Tl-wr940n Firmware | ||
TP-Link TL-WR940N | =v4 | |
All of | ||
Tp-link Tl-wr841n Firmware | ||
TP-LINK TL-WR841N | =v8 | |
All of | ||
Tp-link Tl-wr940n Firmware | ||
TP-Link TL-WR940N | =v2 | |
All of | ||
Tp-link Tl-wr940n Firmware | ||
TP-Link TL-WR940N | =v3 | |
All of | ||
Tp-link Tl-wr941nd Firmware | ||
Tp-link Tl-wr941nd | =v5 | |
All of | ||
Tp-link Tl-wr941nd Firmware | ||
Tp-link Tl-wr941nd | =v6 | |
All of | ||
Tp-link Tl-wr743nd Firmware | ||
Tp-link Tl-wr743nd | =v1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-36358.
TP-Link TL-WR940N V2/V3/V4, TL-WR941ND V5/V6, TL-WR743ND V1, and TL-WR841N V8 are affected by this vulnerability.
The severity of CVE-2023-36358 is high with a severity value of 7.7.
Attackers can cause a Denial of Service (DoS) by sending a crafted GET request.
Please refer to the reference link for more information on available fixes.