An issue in the firmware update process of TP-Link TL-WR941ND V2/V3 up to 3.13.9 and TL-WR941ND V4 up to 3.12.8 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.
References
Link | Resource |
---|---|
https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/SyvnlO9Pi | |
https://www.tp-link.com/us/press/security-advisory/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
07 Nov 2023, 03:55
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
28 Dec 2022, 16:11
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://hackmd.io/@slASVrz_SrW7NQCsunofeA/SyvnlO9Pi - Exploit, Third Party Advisory | |
References | (MISC) https://www.tp-link.com/us/press/security-advisory/ - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Tp-link tl-wr941nd V4
Tp-link tl-wr941nd V2 Tp-link tl-wr941nd V3 Tp-link Tp-link tl-wr941nd V4 Firmware Tp-link tl-wr941nd V2 Firmware Tp-link tl-wr941nd V3 Firmware |
|
CPE | cpe:2.3:o:tp-link:tl-wr941nd_v4_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr941nd_v4:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr941nd_v3:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr941nd_v3_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr941nd_v2:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr941nd_v2_firmware:*:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo |
20 Dec 2022, 20:38
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-20 20:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-46435
Mitre link : CVE-2022-46435
CVE.ORG link : CVE-2022-46435
JSON object : View
Products Affected
tp-link
- tl-wr941nd_v3
- tl-wr941nd_v2
- tl-wr941nd_v3_firmware
- tl-wr941nd_v4
- tl-wr941nd_v2_firmware
- tl-wr941nd_v4_firmware
CWE