This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link AC1750 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-264 is critical due to the potential for arbitrary code execution without authentication.
To fix ZDI-22-264, update your TP-Link AC1750 router firmware to the latest version provided by TP-Link.
ZDI-22-264 affects installations of TP-Link AC1750 routers that are running vulnerable firmware.
Network-adjacent attackers can exploit ZDI-22-264, as it does not require authentication.
The specific component affected by ZDI-22-264 is the NetUSB.ko module within the router's firmware.