An exploitable remote code execution vulnerability exists in the ping and tracert functionality of the TP-Link TL-R600VPN HWv3 FRNv1.3.0 and HWv2 FRNv1.2.3 http server. A specially crafted IP address can cause a stack overflow, resulting in remote code execution. An attacker can send a single authenticated HTTP request to trigger this vulnerability.
2018-12-01T04:29:00.190
2024-11-21T04:06:22.100
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | tp-link | tl-r600vpn_firmware | 1.3.0 | Yes |
Hardware | tp-link | tl-r600vpn | 3 | No |
Operating System | tp-link | tl-r600vpn_firmware | 1.2.3 | Yes |
Hardware | tp-link | tl-r600vpn | 2 | No |