Vulnerability Description
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a buffer overflow via the component /userRpm/WlanMacFilterRpm.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr940N Firmware | - |
| Tp-Link | Tl-Wr940N | 2.0 |
| Tp-Link | Tl-Wr841N Firmware | - |
| Tp-Link | Tl-Wr841N | 8.0 |
| Tp-Link | Tl-Wr740N Firmware | - |
| Tp-Link | Tl-Wr740N | 1.0 |
Related Weaknesses (CWE)
References
- https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/2/TL-WR940N_TL-WR841N_TExploitThird Party Advisory
- https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/2/TL-WR940N_TL-WR841N_TExploitThird Party Advisory
FAQ
What is CVE-2023-33536?
CVE-2023-33536 is a vulnerability with a CVSS score of 8.1 (HIGH). TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a buffer overflow via the component /userRpm/WlanMacFilterRpm.
How severe is CVE-2023-33536?
CVE-2023-33536 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-33536?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr940N Firmware, Tp-Link Tl-Wr940N, Tp-Link Tl-Wr841N Firmware, Tp-Link Tl-Wr841N, Tp-Link Tl-Wr740N Firmware.