Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 09 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link re365 Firmware
|
|
| CPEs | cpe:2.3:h:tp-link:re365:1.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:re365_firmware:180213:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link re365 Firmware
|
Thu, 24 Oct 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 |
Thu, 24 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-787 |
Tue, 03 Sep 2024 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 21 Aug 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link re365 |
|
| Weaknesses | CWE-121 | |
| CPEs | cpe:2.3:h:tp-link:re365:v1_180213:*:*:*:*:*:*:* | |
| Vendors & Products |
Tp-link
Tp-link re365 |
|
| Metrics |
cvssV3_1
|
Mon, 19 Aug 2024 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the TP-Link RE365 V1_180213, there is a buffer overflow vulnerability due to the lack of length verification for the USER_AGENT field in /usr/bin/httpd. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-24T19:43:03.259Z
Reserved: 2024-08-05T00:00:00.000Z
Link: CVE-2024-42815
Updated: 2024-08-21T13:42:19.815Z
Status : Analyzed
Published: 2024-08-19T20:15:07.193
Modified: 2025-07-09T14:47:20.853
Link: CVE-2024-42815
No data.
OpenCVE Enrichment
No data.