TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BJxlw2Pwi - | |
References | () https://www.tp-link.com/us/press/security-advisory/ - Vendor Advisory |
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-12-20 20:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46430
Mitre link : CVE-2022-46430
CVE.ORG link : CVE-2022-46430
JSON object : View
Products Affected
tp-link
- tl-wr740n_v1
- tl-wr740n_v1_firmware
- tl-wr741nd_v1_firmware
- tl-wr741nd_v2
- tl-wr740n_v2_firmware
- tl-wr740n_v2
- tl-wr741nd_v2_firmware
- tl-wr741nd_v1
CWE
CWE-494
Download of Code Without Integrity Check