Arbitrary Code Execution Vulnerability in TP-Link Routers
CVE-2022-42433
6.4MEDIUM
Summary
This vulnerability in TP-Link TL-WR841N routers exposes installations to network-adjacent attackers who can execute arbitrary code. Although authentication is necessary for exploitation, the flawed mechanism can be bypassed. The vulnerability stems from inadequate validation of user-supplied strings utilized in system calls within the ated_tp service. By exploiting this flaw, an attacker may execute code with root privileges, compromising the device's security and potentially enabling further attacks on the network.
Affected Version(s)
TL-WR841N TL-WR841N(US)_V14_220121
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Cyrille Chatras