First published: Fri Dec 30 2022(Updated: )
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the do_sta_enrollee_wifi function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-755ap Firmware | =1.13b01 | |
TRENDnet TEW-755AP | ||
All of | ||
Trendnet Tew-755ap Firmware | =1.13b01 | |
TRENDnet TEW-755AP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-46593.
The severity of CVE-2022-46593 is critical with a CVSS score of 9.8.
TRENDnet TEW755AP 1.13B01 firmware is affected by CVE-2022-46593.
CVE-2022-46593 is a stack overflow vulnerability in TRENDnet TEW755AP 1.13B01 firmware.
No, TRENDnet TEW-755AP is not vulnerable to CVE-2022-46593.
CVE-2022-46593 can be exploited by sending a specially crafted wps_sta_enrollee_pin parameter to the do_sta_enrollee_wifi function.
There is currently no fix available for CVE-2022-46593. It is recommended to follow the vendor's security advisories for updates.
The CWE ID for CVE-2022-46593 is CWE-787 (Out-of-bounds Write).
More information about CVE-2022-46593 can be found at the following reference: [link](https://brief-nymphea-813.notion.site/Vul6-TEW755-bof-do_sta_enrollee_wifi-11ba97191f944eeb88f495091926b7a9)