First published: Mon Aug 21 2023(Updated: )
An issue in the component /userRpm/NetworkCfgRpm of TP-Link TL-WR1041N V2 allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr1041n V2 Firmware | ||
TP-Link TL-WR1041N V2 | ||
All of | ||
Tp-link Tl-wr1041n V2 Firmware | ||
TP-Link TL-WR1041N V2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39748 is a vulnerability in the component /userRpm/NetworkCfgRpm of TP-Link TL-WR1041N V2 that allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
CVE-2023-39748 can cause a Denial of Service (DoS) on TP-Link TL-WR1041N V2 devices.
CVE-2023-39748 has a severity rating of 7.5 (high).
To fix CVE-2023-39748, TP-Link TL-WR1041N V2 users should apply the latest firmware update provided by TP-Link.
More information about CVE-2023-39748 can be found at the following link: [GitHub - TL_WR1041N_NetworkCfgRpm_denial_of_service_vulnerability](https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/19/TL_WR1041N_NetworkCfgRpm_denial_of_service_vulnerability.md)