First published: Fri Dec 30 2022(Updated: )
TRENDnet TEW755AP 1.13B01 was discovered to contain a stack overflow via the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_24g function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trendnet Tew-755ap Firmware | =1.13b01 | |
TRENDnet TEW-755AP | ||
All of | ||
Trendnet Tew-755ap Firmware | =1.13b01 | |
TRENDnet TEW-755AP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-46600 is a vulnerability found in TRENDnet TEW755AP 1.13B01 that allows for a stack overflow through the wps_sta_enrollee_pin parameter in the action set_sta_enrollee_pin_24g function.
CVE-2022-46600 has a severity rating of 9.8, which is considered critical.
TRENDnet TEW755AP firmware version 1.13B01 is affected by CVE-2022-46600.
CVE-2022-46600 is associated with CWE-787, which is a stack-based buffer overflow vulnerability.
No, TRENDnet TEW-755AP is not vulnerable to CVE-2022-46600.
There is currently no patch or fix available for CVE-2022-46600. It is recommended to implement strong network security measures and regularly update your software.
You can find more information about CVE-2022-46600 at the following link: [CVE-2022-46600](https://brief-nymphea-813.notion.site/Vul4-TEW755-injection-set_sta_enrollee_pin_24g-f91b4c03489146af804fe59a3f44d0d3).