Jan. 17, 2023, 5:41 p.m. |

CERT Recently Published Vulnerability Notes kb.cert.org

Overview


TP-Link router WR710N-V1-151022 running firmware published 2015-10-22 and Archer-C5-V2-160201 running firmware published 2016-02-01 are susceptible to two vulnerabilities:



  1. A buffer overflow during HTTP Basic Authentication allowing a remote attacker to corrupt memory allocated on a heap causing denial of service or arbitrary code execution;

  2. A side-channel attack via a strcmp() function in the HTTP daemon allowing deterministic guessing of each byte of a username and password input during authentication.


Description


TP-Link device WR710N-V1-151022 is a 150Mbps Wireless N Mini …

attack authentication basic buffer buffer overflow channel code code execution corrupt daemon denial of service firmware function http input link memory overflow password router routers service side-channel side-channel attack tp-link username vulnerabilities

More from kb.cert.org / CERT Recently Published Vulnerability Notes

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)