First published: Fri Aug 05 2022(Updated: )
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the sntp binary.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tcl Linkhub Mesh Wifi Ac1200 | =ms1g_00_01.00_14 | |
Tcl Linkhub Mesh Wifi Ac1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24025 is high due to the potential for remote code execution via a buffer overflow.
To fix CVE-2022-24025, update the firmware of your TCL LinkHub Mesh Wi-Fi to the latest version released by the manufacturer.
CVE-2022-24025 affects the TCL LinkHub Mesh Wi-Fi model AC1200 with the firmware version ms1g_00_01.00_14.
Yes, an attacker can exploit CVE-2022-24025 remotely by sending a specially-crafted configuration value to the vulnerable device.
The potential impacts of CVE-2022-24025 include unauthorized access, data corruption, or complete control over the affected device.