CVE-2022-48194

TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wr902ac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr902ac:3.0:*:*:*:*:*:*:*

History

10 Apr 2025, 19:15

Type Values Removed Values Added
References (MISC) https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits - Exploit, Third Party Advisory () https://github.com/otsmr/internet-of-vulnerable-things/tree/main/exploits - Exploit, Third Party Advisory
References (MISC) http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html - () http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html -

03 Apr 2023, 20:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/171623/TP-Link-TL-WR902AC-Remote-Code-Execution.html -

Information

Published : 2022-12-30 07:15

Updated : 2025-04-10 19:15


NVD link : CVE-2022-48194

Mitre link : CVE-2022-48194


JSON object : View

Products Affected

tp-link

  • tl-wr902ac
  • tl-wr902ac_firmware
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type