TP-Link WR940N/WR941ND Uninitialized Pointer Vulnerability
2022-6-24 02:56:27 Author: blog.exodusintel.com(查看原文) 阅读量:28 收藏

EIP-9ad27c94

An uninitialized pointer vulnerability exists within TP-Link’s WR940N and WR941ND SOHO router devices specifically during the processing of UPnP/SOAP SUBSCRIBE requests. Successful exploitation allow local unauthenticated attackers the ability to execute arbitrary code under the context of the ‘root’ user.

Vulnerability Identifiers

  • Exodus Intelligence: EIP-9ad27c94
  • MITRE CVE: TBD

Vulnerability Metrics

  • CVSSv2 Score: 8.3

Vendor References

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to affected vendor: December 10th, 2021
  • Disclosed to public: June 23rd, 2022

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program (RSP).


文章来源: https://blog.exodusintel.com/2022/06/23/tp-link-wr940n-wr941nd-uninitialized-pointer-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=tp-link-wr940n-wr941nd-uninitialized-pointer-vulnerability
如有侵权请联系:admin#unsafe.sh