Lucene search

K
zdiVadym KolisnichenkoZDI-22-265
HistoryFeb 10, 2022 - 12:00 a.m.

TP-Link TL-WR940N httpd httpRpmFs Stack-based Buffer Overflow Remote Code Execution Vulnerability

2022-02-1000:00:00
Vadym Kolisnichenko
www.zerodayinitiative.com
34
tp-link
tl-wr940n
httpd
buffer overflow
remote code execution
vulnerability
authentication
file name extensions
validation
user-supplied data
root context

EPSS

0.002

Percentile

57.1%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of file name extensions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

EPSS

0.002

Percentile

57.1%

Related for ZDI-22-265