CMD_FTEST_CONFIG in the TP-Link Device Debug protocol in TP-Link Wireless Router Archer Router version 1.0.0 Build 20180502 rel.45702 (EU) and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payload to the listening server.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://fakhrizulkifli.github.io/posts/2019/07/15/CVE-2019-13613/ | third party advisory exploit |