Vulnerability Description
A vulnerability was found in TP-LINK TL-WR841ND up to 20240920. It has been rated as critical. Affected by this issue is some unknown functionality of the file /userRpm/popupSiteSurveyRpm.htm. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr841Nd Firmware | - |
| Tp-Link | Tl-Wr841Nd | - |
Related Weaknesses (CWE)
References
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TP-LINK/WR-841ND/popupSiBroken Link
- https://vuldb.com/?ctiid.278684Permissions RequiredVDB Entry
- https://vuldb.com/?id.278684Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.411526Third Party AdvisoryVDB Entry
- https://www.tp-link.com/Product
FAQ
What is CVE-2024-9284?
CVE-2024-9284 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A vulnerability was found in TP-LINK TL-WR841ND up to 20240920. It has been rated as critical. Affected by this issue is some unknown functionality of the file /userRpm/popupSiteSurveyRpm.htm. The man...
How severe is CVE-2024-9284?
CVE-2024-9284 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9284?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr841Nd Firmware, Tp-Link Tl-Wr841Nd.