TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow via the dnsserver1 and dnsserver2 parameters at /userRpm/Wan6to4TunnelCfgRpm.htm. This vulnerability allows an authenticated attacker to execute arbitrary code on the remote device in the context of the root user.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Jun 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tp-link
Tp-link tl-wr940n Tp-link tl-wr940n Firmware |
|
CPEs | cpe:2.3:h:tp-link:tl-wr940n:v3:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr940n_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Tp-link
Tp-link tl-wr940n Tp-link tl-wr940n Firmware |
Wed, 15 Jan 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 | |
Metrics |
cvssV3_1
|
Thu, 09 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier contain a buffer overflow via the dnsserver1 and dnsserver2 parameters at /userRpm/Wan6to4TunnelCfgRpm.htm. This vulnerability allows an authenticated attacker to execute arbitrary code on the remote device in the context of the root user. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-01-09T00:00:00
Updated: 2025-01-15T20:26:04.335Z
Reserved: 2024-12-06T00:00:00
Link: CVE-2024-54887

Updated: 2025-01-15T20:25:57.503Z

Status : Analyzed
Published: 2025-01-09T20:15:39.277
Modified: 2025-06-20T18:35:16.170
Link: CVE-2024-54887

No data.