Lucene search

K
nvd[email protected]NVD:CVE-2023-36354
HistoryJun 22, 2023 - 8:15 p.m.

CVE-2023-36354

2023-06-2220:15:09
CWE-120
web.nvd.nist.gov
tp-link
routers
buffer overflow
accessctrltimeschedrpm
denial of service
cve-2023-36354

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.7%

TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR740N V1/V2, TL-WR940N V2/V3, and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlTimeSchedRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.

Affected configurations

NVD
Node
tp-linktl-wr940n_firmwareMatch-
AND
tp-linktl-wr940nMatchv4
Node
tp-linktl-wr841n_firmwareMatch-
AND
tp-linktl-wr841nMatchv8
Node
tp-linktl-wr841n_firmwareMatch-
AND
tp-linktl-wr841nMatchv10
Node
tp-linktl-wr740n_firmwareMatch-
AND
tp-linktl-wr740nMatchv1
Node
tp-linktl-wr740n_firmwareMatch-
AND
tp-linktl-wr740nMatchv2
Node
tp-linktl-wr940n_firmwareMatch-
AND
tp-linktl-wr940nMatchv2
Node
tp-linktl-wr940n_firmwareMatch-
AND
tp-linktl-wr940nMatchv3
Node
tp-linktl-wr941nd_firmwareMatch-
AND
tp-linktl-wr941ndMatchv5
Node
tp-linktl-wr941nd_firmwareMatch-
AND
tp-linktl-wr941ndMatchv6

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

32.7%

Related for NVD:CVE-2023-36354