sunzu2@thebrainbin.org
on 05 Sep 15:31
nextcollapse
Proprietary software
wizardbeard@lemmy.dbzer0.com
on 05 Sep 16:18
nextcollapse
Glad I only have two of their “dumb” switches then.
witty_username@feddit.nl
on 05 Sep 18:10
nextcollapse
“[It] affects several popular models, including the Archer AX10 and AX1500.
[…] input from external messages is used directly to calculate a buffer length […] without any boundary checks. […] A payload of 4096 bytes […] confirmed that the program counter can be overwritten. This means that complete system compromise with root privileges is achievable.”
threaded - newest
In addition to the back doors?
<img alt="" src="https://lemmy.dbzer0.com/pictrs/image/c0558fd0-c466-4564-a398-87e5d0023dad.webp">
Proprietary software
Glad I only have two of their “dumb” switches then.
“[It] affects several popular models, including the Archer AX10 and AX1500.
[…] input from external messages is used directly to calculate a buffer length […] without any boundary checks. […] A payload of 4096 bytes […] confirmed that the program counter can be overwritten. This means that complete system compromise with root privileges is achievable.”
Sounds very fixable
This happens every week, it seems.
A new vulnerability in a TP-Link device? Oh no, it must be a day ending in Y