Lucene search

K
zdiTeam FLASHBACK: Pedro Ribeiro (@pedrib1337 | [email protected]) + Radek Domanski (@RabbitPro)ZDI-22-080
HistoryJan 17, 2022 - 12:00 a.m.

TP-Link Archer C90 DNS Response Stack-based Buffer Overflow Remote Code Execution Vulnerability

2022-01-1700:00:00
Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | [email protected]) + Radek Domanski (@RabbitPro)
www.zerodayinitiative.com
23

0.014 Low

EPSS

Percentile

86.5%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

0.014 Low

EPSS

Percentile

86.5%

Related for ZDI-22-080