Vulnerability Description
A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/get_reset_pwd_veirfy_code feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr886N Firmware | 20190826_2.3.8 |
| Tp-Link | Tl-Wr886N | - |
Related Weaknesses (CWE)
References
- https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getResetVeriRegisterExploitThird Party Advisory
- https://github.com/Yu3H0/IoT_CVE/tree/main/886N/getResetVeriRegisterExploitThird Party Advisory
FAQ
What is CVE-2021-44627?
CVE-2021-44627 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/get_reset_pwd_veirfy_code feature, which allows malicious users to execute arbitrary code on t...
How severe is CVE-2021-44627?
CVE-2021-44627 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-44627?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr886N Firmware, Tp-Link Tl-Wr886N.