We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A stack-based buffer overflow vulnerability exists in the tmUnblock.cgi endpoint of the Linksys WRT120N wireless router. The vulnerability is triggered by sending a specially crafted HTTP POST request with an overly long TM_Block_URL parameter to the endpoint. By exploiting this flaw, an unauthenticated remote attacker can overwrite memory in a controlled manner, enabling them to temporarily reset the administrator password of the device to a blank value. This grants unauthorized access to the router’s web management interface without requiring valid credentials.
Reserved 2025-07-30 | Published 2025-07-31 | Updated 2025-07-31 | Assigner VulnCheckCWE-121 Stack-based Buffer Overflow
Craig Heffner
raw.githubusercontent.com/...ys_tmunblock_admin_reset_bof.rb
www.exploit-db.com/exploits/31758
web.archive.org/...m/2014/02/wrt120n-fprintf-stack-overflow/
www.vulncheck.com/...ed-buffer-overflow-admin-password-reset
nvd.nist.gov (CVE-2014-125122)
Support options