ID

VAR-202207-1925


CVE

CVE-2022-34555


TITLE

TP-LINK Technologies  of  TL-R473G  Firmware vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2022-013952

DESCRIPTION

TP-LINK TL-R473G 2.0.1 Build 220529 Rel.65574n was discovered to contain a remote code execution vulnerability which is exploited via a crafted packet. TP-LINK Technologies of TL-R473G There are unspecified vulnerabilities in the firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2022-34555 // JVNDB: JVNDB-2022-013952 // VULMON: CVE-2022-34555

AFFECTED PRODUCTS

vendor:tp linkmodel:tl-r473gscope:eqversion:2.0.1

Trust: 1.0

vendor:tp linkmodel:tl-r473gscope:eqversion:tl-r473g firmware 2.0.1

Trust: 0.8

vendor:tp linkmodel:tl-r473gscope: - version: -

Trust: 0.8

vendor:tp linkmodel:tl-r473gscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2022-013952 // NVD: CVE-2022-34555

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-34555
value: CRITICAL

Trust: 1.0

NVD: CVE-2022-34555
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202207-2649
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2022-34555
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2022-34555
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2022-013952 // CNNVD: CNNVD-202207-2649 // NVD: CVE-2022-34555

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2022-013952 // NVD: CVE-2022-34555

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202207-2649

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202207-2649

EXTERNAL IDS

db:NVDid:CVE-2022-34555

Trust: 3.3

db:JVNDBid:JVNDB-2022-013952

Trust: 0.8

db:CNNVDid:CNNVD-202207-2649

Trust: 0.6

db:VULMONid:CVE-2022-34555

Trust: 0.1

sources: VULMON: CVE-2022-34555 // JVNDB: JVNDB-2022-013952 // CNNVD: CNNVD-202207-2649 // NVD: CVE-2022-34555

REFERENCES

url:https://github.com/skyedai910/vuln/tree/master/tl-r473g/command_execution_0

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-34555

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2022-34555/

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2022-34555 // JVNDB: JVNDB-2022-013952 // CNNVD: CNNVD-202207-2649 // NVD: CVE-2022-34555

SOURCES

db:VULMONid:CVE-2022-34555
db:JVNDBid:JVNDB-2022-013952
db:CNNVDid:CNNVD-202207-2649
db:NVDid:CVE-2022-34555

LAST UPDATE DATE

2024-08-14T15:42:20.823000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2022-34555date:2022-07-29T00:00:00
db:JVNDBid:JVNDB-2022-013952date:2023-09-13T08:15:00
db:CNNVDid:CNNVD-202207-2649date:2022-08-10T00:00:00
db:NVDid:CVE-2022-34555date:2022-08-04T13:52:37.760

SOURCES RELEASE DATE

db:VULMONid:CVE-2022-34555date:2022-07-28T00:00:00
db:JVNDBid:JVNDB-2022-013952date:2023-09-13T00:00:00
db:CNNVDid:CNNVD-202207-2649date:2022-07-28T00:00:00
db:NVDid:CVE-2022-34555date:2022-07-28T23:15:07.773