First published: Fri Feb 25 2022(Updated: )
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain an integer overflow via the function dm_checkString. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr840n Firmware | =6.20_180709 | |
TP-LINK TL-WR840N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25062 refers to an integer overflow vulnerability in TP-LINK TL-WR840N(ES)_V6.20_180709.
The severity of CVE-2022-25062 is high, with a CVSS score of 7.5.
CVE-2022-25062 allows attackers to cause a Denial of Service (DoS) by exploiting an integer overflow in the function dm_checkString via a crafted HTTP request.
To mitigate CVE-2022-25062, it is recommended to update to a patched version of TP-LINK TL-WR840N(ES) firmware.
More information about CVE-2022-25062 can be found at the following references: [http://router.com](http://router.com), [http://tp-link.com](http://tp-link.com), [https://east-trowel-102.notion.site/CVE-2021-XXXX-RCE-Integer-Overflow-via-crafted-payload-in-an-DNS-input-field-userDomain-EN-2bc0fafd23224a5a8f86f5f0f9377d3d](https://east-trowel-102.notion.site/CVE-2021-XXXX-RCE-Integer-Overflow-via-crafted-payload-in-an-DNS-input-field-userDomain-EN-2bc0fafd23224a5a8f86f5f0f9377d3d)