CVE-2022-4498

In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
References
Link Resource
https://kb.cert.org/vuls/id/572615 Third Party Advisory US Government Resource VDB Entry
https://kb.cert.org/vuls/id/572615 Third Party Advisory US Government Resource VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_c5_firmware:2_160201_us:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_c5:2.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:tl-wr710n_firmware:1_151022_us:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr710n:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://kb.cert.org/vuls/id/572615 - Third Party Advisory, US Government Resource, VDB Entry () https://kb.cert.org/vuls/id/572615 - Third Party Advisory, US Government Resource, VDB Entry
Summary
  • (es) En los routers TP-Link, Archer C5 y WR710N-V1, que ejecutan el último código disponible, al recibir autenticación básica HTTP, se puede enviar al servicio httpd un paquete manipulado que provoca un desbordamiento del almacenamiento dinámico. Esto puede resultar en un DoS (al bloquear el proceso httpd) o en la ejecución de código arbitrario.

06 Jul 2023, 14:46

Type Values Removed Values Added
References (MISC) https://kb.cert.org/vuls/id/572615 - Third Party Advisory, VDB Entry (MISC) https://kb.cert.org/vuls/id/572615 - Third Party Advisory, US Government Resource, VDB Entry
CWE CWE-120 CWE-787

Information

Published : 2023-01-11 21:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4498

Mitre link : CVE-2022-4498

CVE.ORG link : CVE-2022-4498


JSON object : View

Products Affected

tp-link

  • archer_c5_firmware
  • tl-wr710n_firmware
  • tl-wr710n
  • archer_c5
CWE
CWE-787

Out-of-bounds Write