Lucene search

K
cve[email protected]CVE-2022-23919
HistoryAug 05, 2022 - 10:15 p.m.

CVE-2022-23919

2022-08-0522:15:09
CWE-787
CWE-121
web.nvd.nist.gov
46
4
cve-2022-23919
buffer overflow
tcl linkhub
mesh wifi
nvd

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.2%

A stack-based buffer overflow vulnerability exists in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability leverages the name field within the protobuf message to cause a buffer overflow.

Affected configurations

Vulners
NVD
Node
tcllinkhub_mesh_wifi_ac1200Range≀MS1G_00_01.00_14
VendorProductVersionCPE
tcllinkhub_mesh_wifi_ac1200*cpe:2.3:o:tcl:linkhub_mesh_wifi_ac1200:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "LinkHub Mesh Wifi",
    "vendor": "TCL",
    "versions": [
      {
        "status": "affected",
        "version": "MS1G_00_01.00_14"
      }
    ]
  }
]

Social References

More

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

61.2%

Related for CVE-2022-23919