First published: Tue Feb 22 2022(Updated: )
TP-Link TL-WR902AC(US)_V3_191209 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr902ac Firmware | =191209 | |
TP-Link TL-WR902AC | =3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25074 is a vulnerability found in TP-Link TL-WR902AC(US)_V3_191209 routers, allowing unauthenticated attackers to execute arbitrary code due to a stack overflow in the function DM_Fillobjbystr().
CVE-2022-25074 has a severity rating of 9.8 (critical).
CVE-2022-25074 affects TP-Link TL-WR902AC(US)_V3_191209 routers by allowing unauthenticated attackers to execute arbitrary code.
To fix CVE-2022-25074, it is recommended to update the firmware of the TP-Link TL-WR902AC(US)_V3_191209 router to the latest version provided by TP-Link.
You can find more information about CVE-2022-25074 on the GitHub page: https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR902AC