Vulnerability Description
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wpa4220 Firmware | All versions |
| Tp-Link | Tl-Wpa4220 | v2 |
Related Weaknesses (CWE)
References
- https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/ExploitThird Party Advisory
- https://www.tp-link.com/us/securityVendor Advisory
- https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/ExploitThird Party Advisory
- https://www.tp-link.com/us/securityVendor Advisory
FAQ
What is CVE-2020-28005?
CVE-2020-28005 is a vulnerability with a CVSS score of 6.5 (MEDIUM). httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin...
How severe is CVE-2020-28005?
CVE-2020-28005 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-28005?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wpa4220 Firmware, Tp-Link Tl-Wpa4220.