First published: Tue Oct 15 2024(Updated: )
In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WDR7660 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48714 is considered a critical vulnerability due to the potential for remote code execution via stack overflow.
To fix CVE-2024-48714, ensure that you update the firmware of the TP-Link TL-WDR7660 to the latest version provided by the vendor.
CVE-2024-48714 affects TP-Link TL-WDR7660 version 1.0 routers.
CVE-2024-48714 is classified as a stack overflow vulnerability due to improper handling of user input.
Yes, CVE-2024-48714 can be exploited remotely if the attacker sends malicious requests to the vulnerable router.