Vulnerability Details : CVE-2023-30383
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2023-30383
- cpe:2.3:o:tp-link:archer_c2_v1_firmware:170228:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:archer_c50_firmware:160801:*:*:*:*:*:*:*
- cpe:2.3:o:tp-link:archer_c20_firmware:150707:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-30383
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 53 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-30383
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2023-30383
-
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-30383
-
https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware),TPLINK
Download for Archer C50 | TP-LinkProduct
-
https://gist.github.com/a2ure123/a4eda2813d85d8b414bb87e855ab4bf8
CVE-2023-30383 ยท GitHubThird Party Advisory
-
http://tplink.com
WiFi Networking Equipment for Home & Business | TP-LinkProduct
-
https://www.tp-link.com/us/support/download/archer-c50/v2/#Firmware
Download for Archer C50 | TP-LinkProduct
-
https://www.tp-link.com/us/support/download/archer-c2/v1/#Firmware
Download for Archer C2 | TP-LinkProduct
Jump to