First published: Tue Oct 15 2024(Updated: )
In TP-Link TL-WDR7660 1.0, the wacWhitelistJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WDR7660 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-48713 is classified as high due to its potential to cause stack overflow vulnerabilities.
To fix CVE-2024-48713, update the firmware of the TP-Link TL-WDR7660 to the latest version provided by the manufacturer.
CVE-2024-48713 can lead to remote code execution or denial of service through a stack overflow, compromising device functionality and security.
As of now, there have been no confirmed reports of active exploitation in the wild for CVE-2024-48713.
Users and administrators of the TP-Link TL-WDR7660 router should be concerned about CVE-2024-48713 and promptly apply any necessary patches.