Description
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.
Published: 2022-07-14
Score: 8.8 High
EPSS: 12.3% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.129}

epss

{'score': 0.1393}


Subscriptions

Tp-link Tl-wr841 Tl-wr841 Firmware Tl-wr841n Tl-wr841n\(eu\) Tl-wr841n\(eu\) Firmware Tl-wr841n Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:40:46.361Z

Reserved: 2022-05-02T00:00:00.000Z

Link: CVE-2022-30024

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-14T14:15:13.277

Modified: 2024-11-21T07:02:05.870

Link: CVE-2022-30024

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses