ID

VAR-202306-1969


CVE

CVE-2023-36356


TITLE

TP-LINK TL-WR940N Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202306-1628

DESCRIPTION

TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8, TL-WR941ND V5, and TL-WR740N V1/V2 were discovered to contain a buffer read out-of-bounds via the component /userRpm/VirtualServerRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request

Trust: 0.99

sources: NVD: CVE-2023-36356 // VULMON: CVE-2023-36356

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-wr841nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:tl-wr940nscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:tl-wr941ndscope:eqversion: -

Trust: 1.0

vendor:tp linkmodel:tl-wr740nscope:eqversion: -

Trust: 1.0

sources: NVD: CVE-2023-36356

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-36356
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202306-1628
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-36356
baseSeverity: HIGH
baseScore: 7.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.1
impactScore: 4.0
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202306-1628 // NVD: CVE-2023-36356

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

sources: NVD: CVE-2023-36356

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202306-1628

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202306-1628

PATCH

title:TP-LINK TL-WR940N Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=244071

Trust: 0.6

sources: CNNVD: CNNVD-202306-1628

EXTERNAL IDS

db:NVDid:CVE-2023-36356

Trust: 1.7

db:CNNVDid:CNNVD-202306-1628

Trust: 0.6

db:VULMONid:CVE-2023-36356

Trust: 0.1

sources: VULMON: CVE-2023-36356 // CNNVD: CNNVD-202306-1628 // NVD: CVE-2023-36356

REFERENCES

url:https://github.com/a101e-iotvul/iotvul/blob/main/tp-link/4/tl-wr941nd_tl-wr940n_tl-wr740n_userrpm_virtualserverrpm.md

Trust: 1.7

url:https://cxsecurity.com/cveshow/cve-2023-36356/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-36356 // CNNVD: CNNVD-202306-1628 // NVD: CVE-2023-36356

SOURCES

db:VULMONid:CVE-2023-36356
db:CNNVDid:CNNVD-202306-1628
db:NVDid:CVE-2023-36356

LAST UPDATE DATE

2024-08-14T15:36:54.748000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-36356date:2023-06-23T00:00:00
db:CNNVDid:CNNVD-202306-1628date:2023-07-03T00:00:00
db:NVDid:CVE-2023-36356date:2023-06-30T16:18:59.383

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-36356date:2023-06-22T00:00:00
db:CNNVDid:CNNVD-202306-1628date:2023-06-22T00:00:00
db:NVDid:CVE-2023-36356date:2023-06-22T20:15:09.780