First published: Tue Dec 19 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR902AC routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the libcmm.so module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR902AC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-21819 is high due to its potential for arbitrary code execution by network-adjacent attackers.
To fix ZDI-CAN-21819, update the firmware of TP-Link TL-WR902AC routers to the latest version provided by the vendor.
The vulnerability ZDI-CAN-21819 affects TP-Link TL-WR902AC router installations with a specific flaw in the libcmm.so module.
ZDI-CAN-21819 can be exploited through network-adjacent attacks that require authentication.
Exploiting ZDI-CAN-21819 may allow attackers to execute arbitrary code on affected TP-Link TL-WR902AC routers.