Vulnerability Details CVE-2021-35003
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 1.0.6 Build 20200114 rel.73164(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14655.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.106
EPSS Ranking 93.0%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Products affected by CVE-2021-35003
-
cpe:2.3:h:tp-link:archer_c90:-
-
cpe:2.3:o:tp-link:archer_c90_firmware:1.0.6