First published: Wed May 25 2022(Updated: )
TP-Link TL-WR840N EU v6.20 was discovered to contain insecure protections for its UART console. This vulnerability allows attackers to connect to the UART port via a serial connection and execute commands as the root user without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr840n Firmware | ||
TP-LINK TL-WR840N | =6.20 | |
TP-LINK TL-WR840N | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TP-Link TL-WR840N EU v6.20 vulnerability is CVE-2022-29402.
CVE-2022-29402 has a severity rating of 6.8 (high).
The affected software version is TP-Link TL-WR840N EU v6.20.
Attackers can exploit this vulnerability by connecting to the UART port via a serial connection and executing commands as the root user without authentication.
There is no information available about a fix or patch for CVE-2022-29402 at this time.