First published: Tue Dec 20 2022(Updated: )
An exploitable firmware modification vulnerability was discovered on TP-Link TL-WR743ND V1. An attacker can conduct a MITM (Man-in-the-Middle) attack to modify the user-uploaded firmware image and bypass the CRC check, allowing attackers to execute arbitrary code or cause a Denial of Service (DoS). This affects v3.12.20 and earlier.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr743nd V1 Firmware | <=3.12.20 | |
TP-Link TL-WR743ND V1 | ||
All of | ||
Tp-link Tl-wr743nd V1 Firmware | <=3.12.20 | |
TP-Link TL-WR743ND V1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46432 is classified as a high-severity vulnerability due to its potential for remote code execution and Denial of Service (DoS) attacks.
To mitigate CVE-2022-46432, it is recommended to update the firmware of TP-Link TL-WR743ND V1 to the latest version beyond 3.12.20.
Attackers can exploit CVE-2022-46432 to perform a Man-in-the-Middle (MITM) attack, allowing them to modify firmware and potentially execute arbitrary code.
CVE-2022-46432 specifically affects the TP-Link TL-WR743ND V1 running firmware versions up to and including 3.12.20.
Yes, an attacker needs to have network access to conduct the attack and modify the user-uploaded firmware.