First published: Fri Dec 30 2022(Updated: )
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_allow (sub_415B00) function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-755ap Firmware | =1.13b01 | |
TRENDnet TEW-755AP | ||
All of | ||
Trendnet Tew-755ap Firmware | =1.13b01 | |
TRENDnet TEW-755AP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46586 is a vulnerability found in TRENDnet TEW755AP version 1.13B01, which allows an attacker to trigger a stack overflow via the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_allow function.
CVE-2022-46586 has a severity rating of 9.8, which is considered critical.
TRENDnet TEW755AP version 1.13B01 is affected by CVE-2022-46586.
An attacker can exploit CVE-2022-46586 by sending malicious input to the qcawifi.wifi%d_vap%d.maclist parameter in the kick_ban_wifi_mac_allow function, triggering a stack overflow and potentially executing arbitrary code.
Currently, there is no known fix for CVE-2022-46586. It is recommended to apply any patches or updates provided by the vendor or follow their recommended mitigation steps.