First published: Mon Aug 01 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the confsrv set_port_fwd_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tcl Linkhub Mesh Wifi Ac1200 | =ms1g_00_01.00_14 | |
Tcl Linkhub Mesh Wifi Ac1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23399 is a stack-based buffer overflow vulnerability in the confsrv set_port_fwd_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14.
CVE-2022-23399 has a severity rating of 9.8 out of 10, which is considered critical.
CVE-2022-23399 occurs when a specially-crafted network packet triggers a stack-based buffer overflow in the confsrv set_port_fwd_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14.
CVE-2022-23399 affects TCL LinkHub Mesh Wifi MS1G_00_01.00_14.
No, TCL LinkHub Mesh Wifi Ac1200 is not vulnerable to CVE-2022-23399.
CVE-2022-23399 is associated with CWE-119, CWE-787, and CWE-121.
You can find more information about CVE-2022-23399 at the following link: https://talosintelligence.com/vulnerability_reports/TALOS-2022-1454