Vulnerability Description
Stack-based buffer overflow in the httpd server of TP-Link WR1043nd (Firmware Version 3) allows remote attackers to execute arbitrary code via a malicious MediaServer request to /userRpm/MediaServerFoldersCfgRpm.htm.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr1043Nd Firmware | 3.00 |
| Tp-Link | Tl-Wr1043Nd | - |
Related Weaknesses (CWE)
References
- http://tp-link.com/Vendor Advisory
- https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0dayExploitThird Party Advisory
- http://tp-link.com/Vendor Advisory
- https://www.secsignal.org/news/exploiting-routers-just-another-tp-link-0dayExploitThird Party Advisory
FAQ
What is CVE-2018-16119?
CVE-2018-16119 is a vulnerability with a CVSS score of 7.2 (HIGH). Stack-based buffer overflow in the httpd server of TP-Link WR1043nd (Firmware Version 3) allows remote attackers to execute arbitrary code via a malicious MediaServer request to /userRpm/MediaServerFo...
How severe is CVE-2018-16119?
CVE-2018-16119 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16119?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr1043Nd Firmware, Tp-Link Tl-Wr1043Nd.