TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow via the dnsserver1 and dnsserver2 parameters at /userRpm/Wan6to4TunnelCfgRpm.htm. This vulnerability allows an authenticated attacker to execute arbitrary code on the remote device in the context of the root user.
References
| Link | Resource |
|---|---|
| http://tp-link.com | Product |
| https://github.com/JBince/vulnerability-research/tree/main/CVE-2024-54887 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-01-09 20:15
Updated : 2025-06-20 18:35
NVD link : CVE-2024-54887
Mitre link : CVE-2024-54887
CVE.ORG link : CVE-2024-54887
JSON object : View
Products Affected
tp-link
- tl-wr940n
- tl-wr940n_firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
