CVE-2020-28005
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
18/11/2020
Last modified:
01/12/2020
Description
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
3.50
Severity 2.0
LOW
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:tp-link:tl-wpa4220:v2:*:*:*:*:*:*:* | ||
cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:* | ||
cpe:2.3:h:tp-link:tl-wpa4220:v3:*:*:*:*:*:*:* | ||
cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:* | tl-wpa4220\(eu\)_v4_201023 (excluding) | |
cpe:2.3:h:tp-link:tl-wpa4220:v4:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page