-
Home
Your doorway to the internet
Easy ways to expand and enhance your network
Keeping your home wired for quality connections
Equip your devices for a faster Wi-Fi
Everything else you need for a connected lifestyle
-
Smart Home
Keeping an eye on what matters
Smarten up your home devices
Light for every occasion
More than just on and off
-
Business
The smarter cloud solution for business networking
High-Speed wired networking from L3 managed to unmanaged
Professional business Wi-Fi with centralized management
Ideal for long range wireless broadband networking
Secure VPN and Load Balance gateways to the business
VIGI video surveillance is dedicated to your security
-
Service Provider
The reliable choice for home networking
A seamless, intelligent and easy-to-configure mesh network
Capable of high-speed network and integrated broadband applications
The leading technology for delivering gigabit Internet services
Buffer Overflow in pppd Vulnerability
TP-Link has been made aware of a buffer overflow vulnerability in the Point-to-Point Protocol Daemon (pppd) discovered by Ilja Van Sprundel. According to the research, a logic flaw in the pppd is the root cause. An unauthenticated attacker may be able to exploit this to trigger a stack-based buffer overflow, which can cause arbitrary code execution.
At TP-Link, customer security comes first. TP-Link is investigating and will keep updating this advisory as more information becomes available. The affected TP-Link products will be updated as soon as possible and the new firmware, with fixed for this issue, will be made available.
If you have concerns about your TP-Link product, please feel free to contact TP-Link Support: https://www.tp-link.com/support/.
For more information about this vulnerability, please refer to: CVE-2020-8597.
Updates:
2020-03-03 Published Advisory
Your feedback helps improve this site.
Sign Up for News & OffersTP-Link takes your privacy seriously. For further details on TP-Link's privacy practices, see TP-Link's Privacy Policy.