First published: Mon Aug 21 2023(Updated: )
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 were discovered to contain a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr940n V2 Firmware | ||
TP-Link TL-WR940N V2 | ||
Tp-link Tl-wr941nd V5 Firmware | ||
TP-Link TL-WR941ND V5 | ||
Tp-link Tl-wr841n V8 Firmware | ||
TP-Link TL-WR841N V8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39747 is a vulnerability found in TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 routers, which allows for a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.
The severity of CVE-2023-39747 is rated as critical with a CVSS severity score of 9.8.
CVE-2023-39747 can be exploited by sending a specially crafted request to the affected routers, causing a buffer overflow and potentially allowing an attacker to execute arbitrary code.
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 routers are affected by CVE-2023-39747.
At the moment, there is no official fix or patch available for CVE-2023-39747. It is recommended to monitor the vendor's website for any updates or mitigation measures.