### [CVE-2024-11237](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11237) ![](https://img.shields.io/static/v1?label=Product&message=VN020%20F3v(T)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20TT_V6.2.1021%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Memory%20Corruption&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Stack-based%20Buffer%20Overflow&color=brighgreen) ### Description A vulnerability, which was classified as critical, has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected by this issue is some unknown functionality of the component DHCP DISCOVER Packet Parser. The manipulation of the argument hostname leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. ### POC #### Reference No PoCs from references. #### Github - https://github.com/FarhadHosen101/Router - https://github.com/Zephkek/TP-Thumper