First published: Fri Dec 30 2022(Updated: )
TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr902ac Firmware | <=3.0.9.1 | |
TP-Link TL-WR902AC | =3.0 | |
All of | ||
Tp-link Tl-wr902ac Firmware | <=3.0.9.1 | |
TP-Link TL-WR902AC | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TP-Link TL-WR902AC vulnerability is CVE-2022-48194.
The severity of CVE-2022-48194 is high with a CVSS score of 8.8.
Remote authenticated attackers can exploit CVE-2022-48194 by uploading a crafted firmware update.
Remote authenticated attackers can execute arbitrary code or cause a Denial of Service (DoS) by exploiting CVE-2022-48194.
To mitigate the CVE-2022-48194 vulnerability, apply the latest firmware update provided by TP-Link.