Description
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g isolate.
References (1)
Core 1
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/PAGalaxyLab/VulInfo/blob/master/TP-Link/WR886N/inetd_task_dos_05/README.md
Scores
CVSS v3
6.5
EPSS
0.0052
EPSS Percentile
66.9%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
Status
published
Products (2)
tp-link/tl-wr886n_firmware
6.0_2.3.4
tp-link/tl-wr886n_firmware
7.0_1.1.0
Published
Sep 13, 2018
Tracked Since
Feb 18, 2026