In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
2023-01-11T21:15:10.213
2025-04-09T15:15:55.230
Modified
CVSSv3.1: 9.8 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | tp-link | archer_c5_firmware | 2_160201_us | Yes |
Hardware | tp-link | archer_c5 | 2.0 | No |
Operating System | tp-link | tl-wr710n_firmware | 1_151022_us | Yes |
Hardware | tp-link | tl-wr710n | 1.0 | No |