ID

VAR-202306-1762


CVE

CVE-2023-36358


TITLE

TP-LINK TL-WR940N Security hole

Trust: 0.6

sources: CNNVD: CNNVD-202306-1627

DESCRIPTION

TP-Link TL-WR940N V2/V3/V4, TL-WR941ND V5/V6, TL-WR743ND V1 and TL-WR841N V8 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlAccessTargetsRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request

Trust: 0.99

sources: NVD: CVE-2023-36358 // VULMON: CVE-2023-36358

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr940nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:tl-wr743ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:tl-wr841nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:tl-wr941ndscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2023-36358

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-36358
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-36358
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202306-1627
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-36358
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.1
impactScore: 4.0
version: 3.1

Trust: 2.0

sources: CNNVD: CNNVD-202306-1627 // NVD: CVE-2023-36358 // NVD: CVE-2023-36358

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.0

sources: NVD: CVE-2023-36358

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202306-1627

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202306-1627

PATCH

title:TP-LINK TL-WR940N Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=244070

Trust: 0.6

sources: CNNVD: CNNVD-202306-1627

EXTERNAL IDS

db:NVDid:CVE-2023-36358

Trust: 1.7

db:CNNVDid:CNNVD-202306-1627

Trust: 0.6

db:VULMONid:CVE-2023-36358

Trust: 0.1

sources: VULMON: CVE-2023-36358 // CNNVD: CNNVD-202306-1627 // NVD: CVE-2023-36358

REFERENCES

url:https://github.com/a101e-iotvul/iotvul/blob/main/tp-link/6/tl-wr940n_wr941nd_wr743nd_wr841n_userrpm_accessctrlaccesstargetsrpm.md

Trust: 1.7

url:https://cxsecurity.com/cveshow/cve-2023-36358/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-36358 // CNNVD: CNNVD-202306-1627 // NVD: CVE-2023-36358

SOURCES

db:VULMONid:CVE-2023-36358
db:CNNVDid:CNNVD-202306-1627
db:NVDid:CVE-2023-36358

LAST UPDATE DATE

2024-12-11T22:57:52.808000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-36358date:2023-06-23T00:00:00
db:CNNVDid:CNNVD-202306-1627date:2023-07-03T00:00:00
db:NVDid:CVE-2023-36358date:2024-12-10T22:15:05.393

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-36358date:2023-06-22T00:00:00
db:CNNVDid:CNNVD-202306-1627date:2023-06-22T00:00:00
db:NVDid:CVE-2023-36358date:2023-06-22T20:15:09.873