TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html | |
| https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2022-12-30 07:15
Updated : 2023-04-03 20:15
NVD link : CVE-2022-48194
Mitre link : CVE-2022-48194
CVE.ORG link : CVE-2022-48194
JSON object : View
Products Affected
tp-link
- tl-wr902ac
- tl-wr902ac_firmware
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
