ID |
CVE-2018-17012
|
Summary |
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info set_block_flag up_limit. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:tp-link:tl-wr886n_firmware:6.0_2.3.4:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr886n_firmware:6.0_2.3.4:*:*:*:*:*:*:*
-
cpe:2.3:o:tp-link:tl-wr886n_firmware:7.0_1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr886n_firmware:7.0_1.1.0:*:*:*:*:*:*:*
-
cpe:2.3:h:tp-link:tl-wr886n:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr886n:-:*:*:*:*:*:*:*
|
CVSS |
Base: | 4.0 (as of 24-08-2020 - 17:37) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-noinfo |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:S/C:N/I:N/A:P
|
refmap
via4
|
|
Last major update |
24-08-2020 - 17:37 |
Published |
13-09-2018 - 18:29 |
Last modified |
24-08-2020 - 17:37 |