Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-4498


In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.


Published

2023-01-11T21:15:10.213

Last Modified

2025-04-09T15:15:55.230

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System tp-link archer_c5_firmware 2_160201_us Yes
Hardware tp-link archer_c5 2.0 No
Operating System tp-link tl-wr710n_firmware 1_151022_us Yes
Hardware tp-link tl-wr710n 1.0 No

References