CVE-2022-46430

TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wr740n_v1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr740n_v1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:tl-wr740n_v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr740n_v2:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tp-link:tl-wr741nd_v1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr741nd_v1:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:tp-link:tl-wr741nd_v2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr741nd_v2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:30

Type Values Removed Values Added
References () https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BJxlw2Pwi - () https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BJxlw2Pwi -
References () https://www.tp-link.com/us/press/security-advisory/ - Vendor Advisory () https://www.tp-link.com/us/press/security-advisory/ - Vendor Advisory

07 Nov 2023, 03:55

Type Values Removed Values Added
References
  • {'url': 'https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi', 'name': 'https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BJxlw2Pwi -

Information

Published : 2022-12-20 20:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46430

Mitre link : CVE-2022-46430

CVE.ORG link : CVE-2022-46430


JSON object : View

Products Affected

tp-link

  • tl-wr740n_v1
  • tl-wr740n_v1_firmware
  • tl-wr741nd_v1_firmware
  • tl-wr741nd_v2
  • tl-wr740n_v2_firmware
  • tl-wr740n_v2
  • tl-wr741nd_v2_firmware
  • tl-wr741nd_v1
CWE
CWE-494

Download of Code Without Integrity Check