CMD_FTEST_CONFIG in the TP-Link Device Debug protocol in TP-Link Wireless Router Archer Router version 1.0.0 Build 20180502 rel.45702 (EU) and previous versions is prone to a stack-based buffer overflow, which allows a remote malicious user to achieve code execution or denial of service by sending a crafted payload to the listening server.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tp-link archer_c1200_firmware 1.0.0 |