Lucene search

K
cveMitreCVE-2022-48194
HistoryDec 30, 2022 - 7:15 a.m.

CVE-2022-48194

2022-12-3007:15:07
CWE-434
mitre
web.nvd.nist.gov
37
cve-2022-48194
tp-link
tl-wr902ac
firmware update
remote code execution
dos
signature check

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.015

Percentile

87.0%

TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.

Affected configurations

Nvd
Node
tp-linktl-wr902acMatch3.0
AND
tp-linktl-wr902ac_firmwareRange3.0.9.1
VendorProductVersionCPE
tp-linktl-wr902ac3.0cpe:2.3:h:tp-link:tl-wr902ac:3.0:*:*:*:*:*:*:*
tp-linktl-wr902ac_firmware*cpe:2.3:o:tp-link:tl-wr902ac_firmware:*:*:*:*:*:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.015

Percentile

87.0%