CVE-2022-4498

CVSS V2 None CVSS V3 None
Description
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
Overview
  • CVE ID
  • CVE-2022-4498
  • Assigner
  • cret@cert.org
  • Vulnerability Status
  • Undergoing Analysis
  • Published Version
  • 2023-01-11T21:15:10
  • Last Modified Date
  • 2023-01-19T19:10:56
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:tp-link:archer_c5_firmware:2_160201_us:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:tp-link:archer_c5:2.0:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:tp-link:tl-wr710n_firmware:1_151022_us:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:tp-link:tl-wr710n:1.0:*:*:*:*:*:*:* 0 OR
References
Reference URL Reference Tags
https://kb.cert.org/vuls/id/572615
History
Created Old Value New Value Data Type Notes
2023-01-12 05:18:01 Added to TrackCVE
2023-01-12 05:18:02 Weakness Enumeration new
2023-01-12 14:15:16 2023-01-12T13:56:24 CVE Modified Date updated
2023-01-12 14:15:16 Received Awaiting Analysis Vulnerability Status updated
2023-01-18 16:16:13 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-01-19 20:14:04 2023-01-19T19:10:56 CVE Modified Date updated
2023-01-19 20:14:04 Undergoing Analysis Analyzed Vulnerability Status updated
2023-01-19 20:14:05 CPE Information updated
2023-07-05 19:02:27 Analyzed Undergoing Analysis Vulnerability Status updated