First published: Tue Feb 22 2022(Updated: )
TL-WR841Nv14_US_0.9.1_4.18 routers were discovered to contain a stack overflow in the function dm_fillObjByStr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr841n Firmware | =0.9.1_4.18 | |
TP-LINK TL-WR841N | =v14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25073 refers to a stack overflow vulnerability in the TL-WR841Nv14_US_0.9.1_4.18 routers.
CVE-2022-25073 is classified as critical with a severity score of 9.8 out of 10.
CVE-2022-25073 allows unauthenticated attackers to execute arbitrary code on the affected routers.
TL-WR841Nv14_US_0.9.1_4.18 firmware is affected by CVE-2022-25073.
To fix CVE-2022-25073, it is recommended to update the firmware of the TL-WR841Nv14_US_0.9.1_4.18 routers to a patched version provided by the manufacturer.