Vulnerability Description
Multiple stack-based buffer overflows in TP-Link WR940N WiFi routers with hardware version 4 allow remote authenticated users to execute arbitrary code via the (1) ping_addr parameter to PingIframeRpm.htm or (2) dnsserver2 parameter to WanStaticIpV6CfgRpm.htm.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Wr940N Firmware | - |
| Tp-Link | Wr940N | 4 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/158999/TP-Link-WDR4300-Remote-Code-Executio
- https://www.exploit-db.com/exploits/43022/Third Party AdvisoryVDB Entry
- https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/Third Party Advisory
- http://packetstormsecurity.com/files/158999/TP-Link-WDR4300-Remote-Code-Executio
- https://www.exploit-db.com/exploits/43022/Third Party AdvisoryVDB Entry
- https://www.fidusinfosec.com/tp-link-remote-code-execution-cve-2017-13772/Third Party Advisory
FAQ
What is CVE-2017-13772?
CVE-2017-13772 is a vulnerability with a CVSS score of 8.8 (HIGH). Multiple stack-based buffer overflows in TP-Link WR940N WiFi routers with hardware version 4 allow remote authenticated users to execute arbitrary code via the (1) ping_addr parameter to PingIframeRpm...
How severe is CVE-2017-13772?
CVE-2017-13772 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-13772?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Wr940N Firmware, Tp-Link Wr940N.