9
CVSSv2

CVE-2020-8423

Published: 02/04/2020 Updated: 06/04/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote malicious user to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link tl-wr841n_firmware 3.16.9

Github Repositories

Iot-vulhub 自建镜像版

iotvulhub自建镜像使用指南 本项目根据 firmianay/IoT-vulhub 进行加工,原作者删除了 dockerhub 中的镜像,我在本地构建后重新上传 iotvulhub自建镜像使用指南 目前可用镜像 提交镜像方法 准备工作 部分漏洞复现 TP-Link WR841N 栈溢出漏洞(CVE-2020-8423) Tenda AC15 栈溢出漏洞(CVE-2018-16333) 遇到