TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html - | |
References | () https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits - Exploit, Third Party Advisory |
Information
Published : 2022-12-30 07:15
Updated : 2024-11-21 07:32
NVD link : CVE-2022-48194
Mitre link : CVE-2022-48194
CVE.ORG link : CVE-2022-48194
JSON object : View
Products Affected
tp-link
- tl-wr902ac_firmware
- tl-wr902ac
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type