First published: Fri Feb 25 2022(Updated: )
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_setIp6DefaultRoute.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr840n Firmware | =6.20_180709 | |
TP-LINK TL-WR840N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25061 is a command injection vulnerability discovered in TP-LINK TL-WR840N(ES)_V6.20_180709.
CVE-2022-25061 has a severity rating of 9.8, which is considered critical.
The component 'oal_setIp6DefaultRoute' is vulnerable to command injection in TP-LINK TL-WR840N(ES)_V6.20_180709.
To fix CVE-2022-25061, it is recommended to update the TP-LINK TL-WR840N(ES) firmware to a version that addresses the vulnerability.
You can find more information about CVE-2022-25061 at the following references: [http://router.com](http://router.com), [http://tp-link.com](http://tp-link.com), [https://east-trowel-102.notion.site/CVE-2021-XXXX-Injection-of-commands-through-object-oal_setIp6DefaultRoute-EN-ddf9c1db199d49829269147ada6cb312](https://east-trowel-102.notion.site/CVE-2021-XXXX-Injection-of-commands-through-object-oal_setIp6DefaultRoute-EN-ddf9c1db199d49829269147ada6cb312)