TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html | |
https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-12-30T00:00:00
Updated: 2023-04-03T00:00:00
Reserved: 2022-12-30T00:00:00
Link: CVE-2022-48194
JSON object: View
NVD Information
Status : Modified
Published: 2022-12-30T07:15:07.963
Modified: 2023-04-03T20:15:08.340
Link: CVE-2022-48194
JSON object: View
Redhat Information
No data.
CWE