TP-LINK TL-R473G 2.0.1 Build 220529 Rel.65574n was discovered to contain a remote code execution vulnerability which is exploited via a crafted packet.
References
Link | Resource |
---|---|
https://github.com/skyedai910/Vuln/tree/master/TL-R473G/command_execution_0 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
04 Aug 2022, 13:52
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/skyedai910/Vuln/tree/master/TL-R473G/command_execution_0 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:h:tp-link:tl-r473g:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-r473g_firmware:2.0.1:build_220529_rel.65574n:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
First Time |
Tp-link
Tp-link tl-r473g Firmware Tp-link tl-r473g |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
28 Jul 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-07-28 23:15
Updated : 2023-12-10 14:35
NVD link : CVE-2022-34555
Mitre link : CVE-2022-34555
CVE.ORG link : CVE-2022-34555
JSON object : View
Products Affected
tp-link
- tl-r473g
- tl-r473g_firmware
CWE