First published: Mon Aug 01 2022(Updated: )
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the rp-pppoe.so binary.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tcl Linkhub Mesh Wifi Ac1200 | =ms1g_00_01.00_14 | |
Tcl Linkhub Mesh Wifi Ac1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24029 has been rated as a high severity vulnerability due to its potential for remote exploitation via buffer overflow.
To mitigate CVE-2022-24029, users should update the TCL LinkHub Mesh Wi-Fi firmware to the latest version that addresses this vulnerability.
Exploitation of CVE-2022-24029 can allow an attacker to execute arbitrary code, potentially compromising the device and network.
CVE-2022-24029 specifically affects the TCL LinkHub Mesh Wi-Fi model MS1G_00_01.00_14.
Yes, CVE-2022-24029 can severely impact network security by allowing unauthorized access and manipulation of configuration settings.