TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html | |
https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-12-30 07:15
Updated : 2023-04-03 20:15
NVD link : CVE-2022-48194
Mitre link : CVE-2022-48194
CVE.ORG link : CVE-2022-48194
JSON object : View
Products Affected
tp-link
- tl-wr902ac_firmware
- tl-wr902ac
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type