ID

VAR-202206-0808


CVE

CVE-2022-30075


TITLE

TP-LINK Technologies  of  archer ax50  Firmware vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2022-011329

DESCRIPTION

In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation. TP-LINK Technologies of archer ax50 There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-30075 // JVNDB: JVNDB-2022-011329 // VULMON: CVE-2022-30075

AFFECTED PRODUCTS

vendor:tp linkmodel:archer ax50scope:lteversion:210730

Trust: 1.0

vendor:tp linkmodel:archer ax50scope: - version: -

Trust: 0.8

vendor:tp linkmodel:archer ax50scope:lteversion:archer ax50 firmware 210730 and earlier

Trust: 0.8

vendor:tp linkmodel:archer ax50scope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-011329 // NVD: CVE-2022-30075

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-30075
value: HIGH

Trust: 1.0

NVD: CVE-2022-30075
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202206-881
value: HIGH

Trust: 0.6

VULMON: CVE-2022-30075
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-30075
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2022-30075
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-30075
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2022-30075 // JVNDB: JVNDB-2022-011329 // CNNVD: CNNVD-202206-881 // NVD: CVE-2022-30075

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-011329 // NVD: CVE-2022-30075

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202206-881

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-202206-881

PATCH

title:TP-LINK AX50 Fixes for code injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=198086

Trust: 0.6

title: - url:https://github.com/M4fiaB0y/CVE-2022-30075

Trust: 0.1

title: - url:https://github.com/gscamelo/TP-Link-Archer-AX10-V1

Trust: 0.1

title: - url:https://github.com/trhacknon/CVE-2022-30075

Trust: 0.1

title: - url:https://github.com/aaronsvk/CVE-2022-30075

Trust: 0.1

title: - url:https://github.com/JERRY123S/all-poc

Trust: 0.1

title: - url:https://github.com/gotosec/Penetration_Testing_POC

Trust: 0.1

title: - url:https://github.com/cyberanand1337x/bug-bounty-2022

Trust: 0.1

sources: VULMON: CVE-2022-30075 // CNNVD: CNNVD-202206-881

EXTERNAL IDS

db:NVDid:CVE-2022-30075

Trust: 3.3

db:EXPLOIT-DBid:50962

Trust: 2.5

db:PACKETSTORMid:167522

Trust: 2.5

db:JVNDBid:JVNDB-2022-011329

Trust: 0.8

db:CS-HELPid:SB2022061013

Trust: 0.6

db:CXSECURITYid:WLB-2022090003

Trust: 0.6

db:CNNVDid:CNNVD-202206-881

Trust: 0.6

db:VULMONid:CVE-2022-30075

Trust: 0.1

sources: VULMON: CVE-2022-30075 // JVNDB: JVNDB-2022-011329 // CNNVD: CNNVD-202206-881 // NVD: CVE-2022-30075

REFERENCES

url:http://packetstormsecurity.com/files/167522/tp-link-ax50-remote-code-execution.html

Trust: 3.2

url:https://www.exploit-db.com/exploits/50962

Trust: 3.1

url:http://tp-link.com

Trust: 2.5

url:https://github.com/aaronsvk/cve-2022-30075

Trust: 2.5

url:https://github.com/aaronsvk

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-30075

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2022061013

Trust: 0.6

url:https://cxsecurity.com/issue/wlb-2022090003

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-30075/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/m4fiab0y/cve-2022-30075

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-30075 // JVNDB: JVNDB-2022-011329 // CNNVD: CNNVD-202206-881 // NVD: CVE-2022-30075

CREDITS

Tomas Melicher

Trust: 0.6

sources: CNNVD: CNNVD-202206-881

SOURCES

db:VULMONid:CVE-2022-30075
db:JVNDBid:JVNDB-2022-011329
db:CNNVDid:CNNVD-202206-881
db:NVDid:CVE-2022-30075

LAST UPDATE DATE

2024-11-23T22:40:27.107000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-30075date:2022-09-30T00:00:00
db:JVNDBid:JVNDB-2022-011329date:2023-08-21T08:20:00
db:CNNVDid:CNNVD-202206-881date:2022-09-05T00:00:00
db:NVDid:CVE-2022-30075date:2024-11-21T07:02:10.013

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-30075date:2022-06-09T00:00:00
db:JVNDBid:JVNDB-2022-011329date:2023-08-21T00:00:00
db:CNNVDid:CNNVD-202206-881date:2022-06-09T00:00:00
db:NVDid:CVE-2022-30075date:2022-06-09T04:15:11.180