Vulnerability Description
TL-WR841Nv14_US_0.9.1_4.18 routers were discovered to contain a stack overflow in the function dm_fillObjByStr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr841N Firmware | 0.9.1_4.18 |
| Tp-Link | Tl-Wr841N | v14 |
Related Weaknesses (CWE)
References
- https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR841NExploitThird Party Advisory
- https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR841NExploitThird Party Advisory
FAQ
What is CVE-2022-25073?
CVE-2022-25073 is a vulnerability with a CVSS score of 9.8 (CRITICAL). TL-WR841Nv14_US_0.9.1_4.18 routers were discovered to contain a stack overflow in the function dm_fillObjByStr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
How severe is CVE-2022-25073?
CVE-2022-25073 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-25073?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr841N Firmware, Tp-Link Tl-Wr841N.