Vulnerability Description
A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Vn020 F3V Firmware | 6.2.1021 |
| Tp-Link | Vn020 F3V | - |
Related Weaknesses (CWE)
References
- https://github.com/Zephkek/TP-WANPunch/blob/main/README.mdBroken Link
- https://vuldb.com/?ctiid.287262Permissions Required
- https://vuldb.com/?id.287262Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.446212Third Party AdvisoryVDB Entry
- https://www.tp-link.com/Vendor Advisory
FAQ
What is CVE-2024-12343?
CVE-2024-12343 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. ...
How severe is CVE-2024-12343?
CVE-2024-12343 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-12343?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Vn020 F3V Firmware, Tp-Link Vn020 F3V.