HTTP: TP-Link WR940N Buffer Overflow

This signature detects attempts to exploit a known vulnerability against TP-Link WR940N. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Extended Description

Multiple stack-based buffer overflows in TP-Link WR940N WiFi routers with hardware version 4 allow remote authenticated users to execute arbitrary code via the (1) ping_addr parameter to PingIframeRpm.htm or (2) dnsserver2 parameter to WanStaticIpV6CfgRpm.htm.

References

CVE: CVE-2017-13772

Short Name
HTTP:CTS:TP-LINK-WR9400N-BOF
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer CVE-2017-13772 Overflow TP-Link WR940N
Release Date
10/22/2019
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3377
False Positive
Unknown
CVSS Score

9.0

Found a potential security threat?