Description
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU)_V12_160624 and TL-WR841 V11 TL-WR841N(EU)_V11_160325 , TL-WR841N_V11_150616 and TL-WR841 V10 TL-WR841N_V10_150310 are also affected.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| http://tl-wr841.com |
|
| http://tp-link.com |
|
| https://pastebin.com/0XRFr3zE |
|
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T06:40:46.361Z
Reserved: 2022-05-02T00:00:00.000Z
Link: CVE-2022-30024
No data.
Status : Modified
Published: 2022-07-14T14:15:13.277
Modified: 2024-11-21T07:02:05.870
Link: CVE-2022-30024
No data.
OpenCVE Enrichment
No data.
Weaknesses