Lucene search

K
zdiTeam FLASHBACK: Pedro Ribeiro (@pedrib1337 | [email protected]) + Radek Domanski (@RabbitPro)ZDI-22-081
HistoryJan 17, 2022 - 12:00 a.m.

TP-Link TL-WA1201 DNS Response Stack-based Buffer Overflow Remote Code Execution Vulnerability

2022-01-1700:00:00
Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | [email protected]) + Radek Domanski (@RabbitPro)
www.zerodayinitiative.com
21
tp-link
tl-wa1201
dns
buffer overflow
remote code execution
vulnerability
authentication
stack-based buffer
fixed-length buffer
root context

EPSS

0.024

Percentile

90.2%

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link TL-WA1201 wireless access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

EPSS

0.024

Percentile

90.2%

Related for ZDI-22-081