httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023
2020-11-18T16:15:12.303
2024-11-21T05:22:11.103
Modified
CVSSv3.1: 6.5 (MEDIUM)
AV:N/AC:M/Au:S/C:N/I:N/A:P
6.8
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | tp-link | tl-wpa4220_firmware | * | Yes |
Hardware | tp-link | tl-wpa4220 | v2 | No |
Operating System | tp-link | tl-wpa4220_firmware | * | Yes |
Hardware | tp-link | tl-wpa4220 | v3 | No |
Operating System | tp-link | tl-wpa4220_firmware | < tl-wpa4220\(eu\)_v4_201023 | Yes |
Hardware | tp-link | tl-wpa4220 | v4 | No |