CVE-2023-34832

TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_ax10_firmware:230220:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax10:1.2:*:*:*:*:*:*:*

History

23 Jun 2023, 21:19

Type Values Removed Values Added
References (MISC) https://gist.github.com/jhacker91/2026e080a42514255e758d64b465d1d5 - (MISC) https://gist.github.com/jhacker91/2026e080a42514255e758d64b465d1d5 - Exploit, Third Party Advisory
References (MISC) http://tp-link.com - (MISC) http://tp-link.com - Product
References (MISC) http://archer.com - (MISC) http://archer.com - Not Applicable
References (MISC) http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html - (MISC) http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html - Exploit, Third Party Advisory, VDB Entry
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-120
First Time Tp-link
Tp-link archer Ax10 Firmware
Tp-link archer Ax10
CPE cpe:2.3:o:tp-link:archer_ax10_firmware:230220:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax10:1.2:*:*:*:*:*:*:*

16 Jun 2023, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-16 18:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-34832

Mitre link : CVE-2023-34832

CVE.ORG link : CVE-2023-34832


JSON object : View

Products Affected

tp-link

  • archer_ax10_firmware
  • archer_ax10
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')