In TP-Link TL-WDR7660 1.0, the wlanTimerRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00061}

epss

{'score': 0.00068}


Wed, 21 May 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link tl-wdr7660
CPEs cpe:2.3:h:tp-link:tl-wdr7660:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wdr7660_firmware:1.0:*:*:*:*:*:*:*
Vendors & Products Tp-link tl-wdr7660

Wed, 16 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tl-wdr7660 Firmware
Weaknesses CWE-120
CPEs cpe:2.3:o:tp-link:tl-wdr7660_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link
Tp-link tl-wdr7660 Firmware
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 20:45:00 +0000

Type Values Removed Values Added
Description In TP-Link TL-WDR7660 1.0, the wlanTimerRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-16T17:05:37.695Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48710

cve-icon Vulnrichment

Updated: 2024-10-16T17:05:31.132Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-15T21:15:11.123

Modified: 2025-05-21T20:27:52.127

Link: CVE-2024-48710

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.