TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.
References
Link | Resource |
---|---|
https://hackmd.io/@slASVrz_SrW7NQCsunofeA/BJxlw2Pwi | Exploit Third Party Advisory |
https://www.tp-link.com/us/press/security-advisory/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2022-12-20 12:15
Updated : 2022-12-28 09:12
NVD link : CVE-2022-46430
Mitre link : CVE-2022-46430
JSON object : View
CWE
CWE-494
Download of Code Without Integrity Check
Products Affected
tp-link
- tl-wr741nd_v2_firmware
- tl-wr741nd_v1
- tl-wr741nd_v2
- tl-wr741nd_v1_firmware
- tl-wr740n_v1
- tl-wr740n_v1_firmware
- tl-wr740n_v2
- tl-wr740n_v2_firmware