Lucene search

K
zdiNicholas Zubrisky and Peter Girnus of Trend Micro Zero Day InitiativeZDI-23-1809
HistoryDec 19, 2023 - 12:00 a.m.

TP-Link TL-WR902AC dm_fillObjByStr Stack-based Buffer Overflow Remote Code Execution Vulnerability

2023-12-1900:00:00
Nicholas Zubrisky and Peter Girnus of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
17
vulnerability
tp-link tl-wr902ac
remote code execution
authentication required
libcmm.so module
stack-based buffer overflow

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR902AC routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the libcmm.so module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

7.5 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

Related for ZDI-23-1809