Vulnerability Description
A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 via the /cloud_config/router_post/check_reset_pwd_verify_code interface.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr886N Firmware | 20190826_2.3.8 |
| Tp-Link | Tl-Wr886N | - |
Related Weaknesses (CWE)
References
- https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkResetVeriRegisterExploitThird Party Advisory
- https://github.com/Yu3H0/IoT_CVE/tree/main/886N/chkResetVeriRegisterExploitThird Party Advisory
FAQ
What is CVE-2021-44623?
CVE-2021-44623 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 via the /cloud_config/router_post/check_reset_pwd_verify_code interface.
How severe is CVE-2021-44623?
CVE-2021-44623 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-44623?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr886N Firmware, Tp-Link Tl-Wr886N.