First published: Thu Jul 07 2022(Updated: )
An infinite loop in the function httpRpmPass of TP-Link TL-WR741N/TL-WR742N V1/V2/V3_130415 allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR741ND Firmware | ||
TP-Link TL-WR741ND | =v1 | |
TP-Link TL-WR741ND | =v2 | |
TP-Link TL-WR742N | ||
TP-Link TL-WR742N Firmware | =v1 | |
TP-Link TL-WR742N Firmware | =v2 | |
TP-Link TL-WR741ND Firmware | =v3_130415 | |
TP-Link TL-WR741ND | =v3 | |
TP-Link TL-WR742N | =v3_130415 | |
TP-Link TL-WR742N Firmware | =v3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32058 has been classified as a Denial of Service (DoS) vulnerability.
To fix CVE-2022-32058, update your firmware to the latest version provided by TP-Link.
CVE-2022-32058 affects the TP-Link TL-WR741N and TL-WR742N models with specific firmware versions.
Yes, CVE-2022-32058 can be exploited remotely via crafted packets.
CVE-2022-32058 can cause an infinite loop, leading to a Denial of Service that impacts network availability.