Rewterz Threat Advisory – Apache Cayenne, APISIX and Cassandra Vulnerabilities
February 14, 2022Rewterz Threat Alert – Vidar Malware – Active IOCs
February 14, 2022Rewterz Threat Advisory – Apache Cayenne, APISIX and Cassandra Vulnerabilities
February 14, 2022Rewterz Threat Alert – Vidar Malware – Active IOCs
February 14, 2022Severity
High
Analysis Summary
CVE-2022-24355
TP-Link TL-WR940N is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the parsing of file name extensions. By sending a specially-crafted request, a remote attacker could overflow a buffer and execute arbitrary code on the system.
CVE-2022-24354
TP-Link AC1750 could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the NetUSB.ko module. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2022-24353
TP-Link AC1750 could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read in the NetUSB.ko module. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2022-24352
TP-Link AC1750 could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds read in the NetUSB.ko kernel module. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Buffer Overflow
- Code Execution
Indicators of Compromise
CVE
- CVE-2022-24355
- CVE-2022-24354
- CVE-2022-24353
- CVE-2022-24352
Affected Vendors
TP-Link
Affected Products
- TP-LINK TL-WR940N
- TP-Link Archer A7 AC1750
Remediation
Upgrade to the latest version of TP-Link, available from the TP-Link Web site.