This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link AC1750 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15835 is classified as critical due to its potential for arbitrary code execution.
To fix ZDI-CAN-15835, update the firmware of your TP-Link AC1750 router to the latest version provided by the vendor.
ZDI-CAN-15835 affects installations of TP-Link AC1750 routers that have the vulnerable NetUSB.ko module.
No, authentication is not required to exploit ZDI-CAN-15835, making it accessible to network-adjacent attackers.
The nature of the vulnerability in ZDI-CAN-15835 is a flaw in the NetUSB.ko module that allows for arbitrary code execution.