mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
21 lines
1.1 KiB
Markdown
21 lines
1.1 KiB
Markdown
### [CVE-2021-35003](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35003)
|
|

|
|
%20&color=brightgreen)
|
|

|
|
|
|
### Description
|
|
|
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 1.0.6 Build 20200114 rel.73164(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14655.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cve-scores
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/attilaszia/linux-iot-cves
|
|
- https://github.com/rdomanski/Exploits_and_Advisories
|
|
|