CVE-2022-4498
CVSS V2 None
CVSS V3 None
Description
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
Overview
- CVE ID
- CVE-2022-4498
- Assigner
- cret@cert.org
- Vulnerability Status
- Undergoing Analysis
- Published Version
- 2023-01-11T21:15:10
- Last Modified Date
- 2023-01-19T19:10:56
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:tp-link:archer_c5_firmware:2_160201_us:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:tp-link:archer_c5:2.0:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:tp-link:tl-wr710n_firmware:1_151022_us:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:tp-link:tl-wr710n:1.0:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://kb.cert.org/vuls/id/572615 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-4498 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4498 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-01-12 05:18:01 | Added to TrackCVE | |||
2023-01-12 05:18:02 | Weakness Enumeration | new | ||
2023-01-12 14:15:16 | 2023-01-12T13:56:24 | CVE Modified Date | updated | |
2023-01-12 14:15:16 | Received | Awaiting Analysis | Vulnerability Status | updated |
2023-01-18 16:16:13 | Awaiting Analysis | Undergoing Analysis | Vulnerability Status | updated |
2023-01-19 20:14:04 | 2023-01-19T19:10:56 | CVE Modified Date | updated | |
2023-01-19 20:14:04 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-01-19 20:14:05 | CPE Information | updated | ||
2023-07-05 19:02:27 | Analyzed | Undergoing Analysis | Vulnerability Status | updated |