In TP-Link TL-WDR7660 1.0, the wacWhitelistJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00061}

epss

{'score': 0.00068}


Wed, 21 May 2025 20:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link tl-wdr7660
CPEs cpe:2.3:h:tp-link:tl-wdr7660:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wdr7660_firmware:1.0:*:*:*:*:*:*:*
Vendors & Products Tp-link tl-wdr7660

Wed, 16 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tl-wdr7660 Firmware
Weaknesses CWE-120
CPEs cpe:2.3:o:tp-link:tl-wdr7660_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link
Tp-link tl-wdr7660 Firmware
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Oct 2024 20:45:00 +0000

Type Values Removed Values Added
Description In TP-Link TL-WDR7660 1.0, the wacWhitelistJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-16T17:04:21.066Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48713

cve-icon Vulnrichment

Updated: 2024-10-16T17:04:12.391Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-15T21:15:11.227

Modified: 2025-05-21T20:27:36.173

Link: CVE-2024-48713

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.