Lucene search

K
cve[email protected]CVE-2023-36354
HistoryJun 22, 2023 - 8:15 p.m.

CVE-2023-36354

2023-06-2220:15:09
CWE-120
web.nvd.nist.gov
15
cve-2023-36354
tp-link
buffer overflow
denial of service
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.7%

TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR740N V1/V2, TL-WR940N V2/V3, and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlTimeSchedRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.

Affected configurations

NVD
Node
tp-linktl-wr940n_firmwareMatch-
AND
tp-linktl-wr940nMatchv4
Node
tp-linktl-wr841n_firmwareMatch-
AND
tp-linktl-wr841nMatchv8
Node
tp-linktl-wr841n_firmwareMatch-
AND
tp-linktl-wr841nMatchv10
Node
tp-linktl-wr740n_firmwareMatch-
AND
tp-linktl-wr740nMatchv1
Node
tp-linktl-wr740n_firmwareMatch-
AND
tp-linktl-wr740nMatchv2
Node
tp-linktl-wr940n_firmwareMatch-
AND
tp-linktl-wr940nMatchv2
Node
tp-linktl-wr940n_firmwareMatch-
AND
tp-linktl-wr940nMatchv3
Node
tp-linktl-wr941nd_firmwareMatch-
AND
tp-linktl-wr941ndMatchv5
Node
tp-linktl-wr941nd_firmwareMatch-
AND
tp-linktl-wr941ndMatchv6

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.7%

Related for CVE-2023-36354