First published: Fri Aug 05 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability leverages the ethAddr field within the protobuf message to cause a buffer overflow.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tcl Linkhub Mesh Wifi Ac1200 | =ms1g_00_01.00_14 | |
Tcl Linkhub Mesh Wifi Ac1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23918 is classified as a critical vulnerability due to its potential for exploitation via stack-based buffer overflow.
To fix CVE-2022-23918, update the Tcl LinkHub Mesh Wifi AC1200 to the latest firmware version that addresses the vulnerability.
Users of the Tcl LinkHub Mesh Wifi AC1200 running firmware version ms1g_00_01.00_14 are affected by CVE-2022-23918.
CVE-2022-23918 enables attackers to send specially-crafted network packets that can lead to a stack-based buffer overflow.
CVE-2022-23918 is a remote vulnerability, allowing attackers to exploit it over the network without requiring physical access.