Lucene search

K
cve[email protected]CVE-2022-48194
HistoryDec 30, 2022 - 7:15 a.m.

CVE-2022-48194

2022-12-3007:15:07
CWE-434
web.nvd.nist.gov
34
cve-2022-48194
tp-link
tl-wr902ac
firmware update
remote code execution
dos
signature check

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.016 Low

EPSS

Percentile

87.5%

TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.

Affected configurations

NVD
Node
tp-linktl-wr902acMatch3.0
AND
tp-linktl-wr902ac_firmwareRange3.0.9.1

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.016 Low

EPSS

Percentile

87.5%