First published: Mon Aug 21 2023(Updated: )
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr940n V2 Firmware | ||
TP-Link TL-WR940N V2 | ||
Tp-link Tl-wr941nd V5 Firmware | ||
TP-Link TL-WR941ND V5 | ||
Tp-link Tl-wr841n V8 Firmware | ||
TP-Link TL-WR841N V8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39745 is a vulnerability found in TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5, and TP-Link TL-WR841N V8 routers that allows attackers to cause a Denial of Service (DoS) through a crafted GET request.
CVE-2023-39745 has a severity value of 7.5, which is considered high.
The affected software includes TP-Link TL-WR940N V2 Firmware, TP-Link TL-WR941ND V5 Firmware, and TP-Link TL-WR841N V8 Firmware.
The vulnerability can be exploited by sending a crafted GET request to the /userRpm/AccessCtrlAccessRulesRpm component.
No, TP-Link TL-WR940N V2 is not vulnerable to CVE-2023-39745.