CVE-2022-24353
HIGHTP-Link AC1750 <1.1.4 Build 20211022 rel.59103(5553) - RCE
Title source: llmDescription
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-15769.
References (1)
Core 1
Core References
Third Party Advisory, VDB Entry
https://www.zerodayinitiative.com/advisories/ZDI-22-263/
Scores
CVSS v3
8.8
EPSS
0.0018
EPSS Percentile
38.9%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-125
Status
published
Products (1)
tp-link/ac1750_firmware
< 211210
Published
Mar 28, 2023
Tracked Since
Feb 18, 2026