#VU73759 Stack-based buffer overflow in Archer AX21 - CVE-2023-27333

 

#VU73759 Stack-based buffer overflow in Archer AX21 - CVE-2023-27333

Published: March 16, 2023


Vulnerability identifier: #VU73759
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2023-27333
CWE-ID: CWE-121
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
Archer AX21
Software vendor:
TP-Link

Description

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the handling of command 0x422 provided to the tmpServer service. A remote administrator on the local network can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links