CVE-2020-28005
Published on: 11/18/2020 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:23:25 PM UTC
Certain versions of Tl-wpa4220 from Tp-link contain the following vulnerability:
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023
- CVE-2020-28005 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 6.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | NONE | NONE | HIGH |
CVSS2 Score: 3.5 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | NONE | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
CVE-2020-24297 and CVE-2020-28005: Vulnerabilities in TP-Link's TL-WPA4220 | the hyperbolic | Exploit Third Party Advisory the-hyperbolic.com text/html |
![]() |
TP-Link - Security Advisory | TP-Link | Vendor Advisory www.tp-link.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware | Tp-link | Tl-wpa4220 | v2 | All | All | All |
Hardware | Tp-link | Tl-wpa4220 | v3 | All | All | All |
Hardware | Tp-link | Tl-wpa4220 | v4 | All | All | All |
Hardware | Tp-link | Tl-wpa4220 | v2 | All | All | All |
Hardware | Tp-link | Tl-wpa4220 | v3 | All | All | All |
Hardware | Tp-link | Tl-wpa4220 | v4 | All | All | All |
Operating System | Tp-link | Tl-wpa4220 Firmware | All | All | All | All |
Operating System | Tp-link | Tl-wpa4220 Firmware | All | All | All | All |
- cpe:2.3:h:tp-link:tl-wpa4220:v2:*:*:*:*:*:*:*:
- cpe:2.3:h:tp-link:tl-wpa4220:v3:*:*:*:*:*:*:*:
- cpe:2.3:h:tp-link:tl-wpa4220:v4:*:*:*:*:*:*:*:
- cpe:2.3:h:tp-link:tl-wpa4220:v2:*:*:*:*:*:*:*:
- cpe:2.3:h:tp-link:tl-wpa4220:v3:*:*:*:*:*:*:*:
- cpe:2.3:h:tp-link:tl-wpa4220:v4:*:*:*:*:*:*:*:
- cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:*:
- cpe:2.3:o:tp-link:tl-wpa4220_firmware:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE