Advisory Details

January 17th, 2022

TP-Link Archer C90 DNS Response Stack-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-22-080
ZDI-CAN-14655

CVE ID CVE-2021-35003
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS TP-Link
AFFECTED PRODUCTS Archer C90
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

ADDITIONAL DETAILS

Fixed in version 6


DISCLOSURE TIMELINE
  • 2021-09-16 - Vulnerability reported to vendor
  • 2022-01-17 - Coordinated public release of advisory
CREDIT Team FLASHBACK: Pedro Ribeiro (@pedrib1337 | pedrib@gmail.com) + Radek Domanski (@RabbitPro)
BACK TO ADVISORIES