### [CVE-2024-11237](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11237) ![](https://img.shields.io/static/v1?label=Product&message=VN020%20F3v(T)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=TT_V6.2.1021%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=tt_v6.2.1021%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Memory%20Corruption&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20Buffer%20Overflow&color=brightgreen) ### Description A vulnerability, which was classified as critical, has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected by this issue is some unknown functionality of the component DHCP DISCOVER Packet Parser. The manipulation of the argument hostname leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Eine kritische Schwachstelle wurde in TP-Link VN020 F3v(T) TT_V6.2.1021 entdeckt. Dies betrifft einen unbekannten Teil der Komponente DHCP DISCOVER Packet Parser. Durch die Manipulation des Arguments hostname mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. ### POC #### Reference - https://github.com/Zephkek/TP-Thumper - https://github.com/Zephkek/TP-Thumper/blob/main/poc.c #### Github - https://github.com/FarhadHosen101/Router - https://github.com/Fh-tutul1751/Router - https://github.com/Zephkek/TP-Thumper