In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
2023-01-11T21:15:10.213
2025-11-04T20:16:15.240
Modified
CVSSv3.1: 9.8 (CRITICAL)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | tp-link | archer_c5_firmware | 2_160201_us | Yes |
| Hardware | tp-link | archer_c5 | 2.0 | No |
| Operating System | tp-link | tl-wr710n_firmware | 1_151022_us | Yes |
| Hardware | tp-link | tl-wr710n | 1.0 | No |