| CVE ID | CVE-2022-42433 |
| CVSS SCORE | 6.4, AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H |
| AFFECTED VENDORS |
TP-Link |
| AFFECTED PRODUCTS |
TL-WR841N |
| VULNERABILITY DETAILS |
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the ated_tp service. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. |
| ADDITIONAL DETAILS |
Fixed in firmware 220914. |
| DISCLOSURE TIMELINE |
|
| CREDIT | Cyrille Chatras |