Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-42433

Опубликовано: 29 мар. 2023
Источник: nvd
CVSS3: 6.4
CVSS3: 8
EPSS Низкий

Описание

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N TL-WR841N(US)_V14_220121 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ated_tp service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17356.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:tp-link:tl-wr841_firmware:*:*:*:*:*:*:*:*
Версия до 220914 (исключая)
cpe:2.3:h:tp-link:tl-wr841n:-:*:*:*:*:*:*:*

EPSS

Процентиль: 4%
0.00019
Низкий

6.4 Medium

CVSS3

8 High

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8
github
почти 3 года назад

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N TL-WR841N(US)_V14_220121 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ated_tp service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-17356.

CVSS3: 6.4
fstec
больше 3 лет назад

Уязвимость службы ated_tp микропрограммного обеспечения маршрутизаторов TP-Link TL-WR841N, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 4%
0.00019
Низкий

6.4 Medium

CVSS3

8 High

CVSS3

Дефекты

CWE-78