CVE-2022-46428

Published: Dic 20, 2022 Last Modified: Apr 16, 2025 EU-VD ID: EUVD-2022-49233 Aliases: GSD-2022-46428
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,8
Attack Vector: network
Attack Complexity: high
Privileges Required: low
User Interaction: required
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

TP-Link TL-WR1043ND V1 3.13.15 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0018
Percentile
0,4th
Updated

EPSS Score Trend (Last 90 Days)

494

Download of Code Without Integrity Check

Draft
Common Consequences
Security Scopes Affected:
Integrity Availability Confidentiality Other
Potential Impacts:
Execute Unauthorized Code Or Commands Alter Execution Logic Other
Applicable Platforms
All platforms may be affected
View CWE Details
Operating System

Tl-Wr1043Nd V1 Firmware by Tp-Link

Version Range Affected
To 3.13.15 (inclusive)
cpe:2.3:o:tp-link:tl-wr1043nd_v1_firmware:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1hP34Hvj
https://www.tp-link.com/us/press/security-advisory/
https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/S1hP34Hvj
https://www.tp-link.com/us/press/security-advisory/