TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.
References
Link | Resource |
---|---|
https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BJxlw2Pwi | |
https://www.tp-link.com/us/press/security-advisory/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2022-12-20 20:15
Updated : 2023-11-07 03:55
NVD link : CVE-2022-46430
Mitre link : CVE-2022-46430
CVE.ORG link : CVE-2022-46430
JSON object : View
Products Affected
tp-link
- tl-wr740n_v1_firmware
- tl-wr741nd_v2
- tl-wr740n_v2
- tl-wr741nd_v1
- tl-wr740n_v1
- tl-wr740n_v2_firmware
- tl-wr741nd_v1_firmware
- tl-wr741nd_v2_firmware
CWE
CWE-494
Download of Code Without Integrity Check