Description
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023
References (2)
Core 2
Core References
Vendor Advisory x_refsource_misc
https://www.tp-link.com/us/security
Exploit, Third Party Advisory x_refsource_misc
https://the-hyperbolic.com/posts/vulnerabilities-in-tlwpa4220/
Scores
CVSS v3
6.5
EPSS
0.0092
EPSS Percentile
76.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-120
Status
published
Products (1)
tp-link/tl-wpa4220_firmware
Published
Nov 18, 2020
Tracked Since
Feb 18, 2026