CERT-In Vulnerability Note
CIVN-2019-0189
Remote code execution Vulnerability in TP-LINK Routers
Original Issue Date:December 02, 2019
Severity Rating: MEDIUM
Component Affected
- TP-LINK TL-WR841N routers
Overview
A vulnerability has been reported in TP-LINK routers (TL-WR841N) which could be exploited by a remote attacker to unauthenticated complete control of an affected device.
Description
A vulnerability exists in TP-LINK routers (TL-WR841N) could allows remote attacker to execute arbitrary code on the target device due to improper bounds checking by the "http_parser_main" function in the web service. A remote attacker could exploit on the local network can send a specially crafted HTTP Host request header, trigger memory corruption and execute arbitrary code in the context of the admin user.
Successful exploitation of this vulnerability could allow a remote attacker to take complete control and compromise of vulnerable device.
Solution
Apply appropriate updates as mentioned in:
https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware
Vendor Information
TP-LINK
https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware
References
TP-LINK
https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware
Cyber Security
https://www.cybersecurity-help.cz/vdb/SB2019112810?affChecked=1
Zero Day
https://www.zerodayinitiative.com/advisories/ZDI-19-992/
CVE Name
CVE-2018-17147
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|