A vulnerable HTTP Basic Authentication process in TP-Link routers, Archer C5 and WR710N-V1, is susceptible to either a DoS or an arbitrary code execution via any interface.
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
Problem Types
| Type | CWE ID | Description |
|---|
| N/A | N/A | CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
Type: N/A
CWE ID: N/A
Description: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
| Version | Base score | Base severity | Vector |
|---|