CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
43.4%
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 were discovered to contain a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.
Vendor | Product | Version | CPE |
---|---|---|---|
tp-link | tl-wr940n_v2_firmware | - | cpe:2.3:o:tp-link:tl-wr940n_v2_firmware:-:*:*:*:*:*:*:* |
tp-link | tl-wr940n_v2 | - | cpe:2.3:h:tp-link:tl-wr940n_v2:-:*:*:*:*:*:*:* |
tp-link | tl-wr941nd_v5_firmware | - | cpe:2.3:o:tp-link:tl-wr941nd_v5_firmware:-:*:*:*:*:*:*:* |
tp-link | tl-wr941nd_v5 | - | cpe:2.3:h:tp-link:tl-wr941nd_v5:-:*:*:*:*:*:*:* |
tp-link | tl-wr841n_v8_firmware | - | cpe:2.3:o:tp-link:tl-wr841n_v8_firmware:-:*:*:*:*:*:*:* |
tp-link | tl-wr841n_v8 | - | cpe:2.3:h:tp-link:tl-wr841n_v8:-:*:*:*:*:*:*:* |