First published: Mon Aug 01 2022(Updated: )
A stack-based buffer overflow vulnerability exists in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14. A specially-crafted network packet can lead to stack-based buffer overflow. An attacker can send a malicious packet to trigger this vulnerability.This vulnerability leverages the name field within the protobuf message to cause a buffer overflow.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tcl Linkhub Mesh Wifi Ac1200 | =ms1g_00_01.00_14 | |
Tcl Linkhub Mesh Wifi Ac1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23919 is a stack-based buffer overflow vulnerability in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14.
The severity of CVE-2022-23919 is critical with a severity value of 9.8.
The TCL LinkHub Mesh Wifi MS1G_00_01.00_14 software is affected by CVE-2022-23919.
CVE-2022-23919 occurs when a specially-crafted network packet triggers a stack-based buffer overflow in the confsrv set_mf_rule functionality of TCL LinkHub Mesh Wifi MS1G_00_01.00_14.
At the moment, there is no information available regarding a fix for CVE-2022-23919. It is recommended to follow the vendor's security advisory for updates.