Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
CVE-2023-27333 CVSS:8.8
TP-Link Archer AX21 routers are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the command 0x422 provided to the tmpServer service. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code in the context of root.
CVE-2023-27332 CVSS:8.8
TP-Link Archer AX21 routers are vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the logging functionality of the tdpServer program. By sending a specially crafted request, a remote attacker could overflow a buffer and execute arbitrary code in the context of root.
TP-Link
Upgrade to the latest version of Archer AX21, available from the TP-Link Website.