CVE-2022-48194

TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wr902ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr902ac:3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:32

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html -
References () https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits - Exploit, Third Party Advisory () https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits - Exploit, Third Party Advisory

Information

Published : 2022-12-30 07:15

Updated : 2024-11-21 07:32


NVD link : CVE-2022-48194

Mitre link : CVE-2022-48194

CVE.ORG link : CVE-2022-48194


JSON object : View

Products Affected

tp-link

  • tl-wr902ac_firmware
  • tl-wr902ac
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type