ID CVE-2020-10881
Summary This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-9660.
References
Vulnerable Configurations
  • cpe:2.3:o:tp-link:ac1750_firmware:190726:*:*:*:*:*:*:*
    cpe:2.3:o:tp-link:ac1750_firmware:190726:*:*:*:*:*:*:*
  • cpe:2.3:h:tp-link:ac1750:-:*:*:*:*:*:*:*
    cpe:2.3:h:tp-link:ac1750:-:*:*:*:*:*:*:*
CVSS
Base: 10.0
Impact:
Exploitability:
CWE CWE-787
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
Last major update 25-03-2020 - 21:15
Published 25-03-2020 - 21:15
Last modified 31-03-2020 - 17:26
Back to Top