CVE-2022-49134
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2022-49134 is a command execution vulnerability that exists in the tddpd enabletestmode functionality of Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) v5.1.0 Build 20220926 and Tp-Link N300 Wireless Access Point (EAP115 V4) v5.0.4 Build 20220216. The vulnerability was discovered in 2022 and affects specific TP-Link access point models (CERT-FR).

Technical details

The vulnerability allows an attacker to execute arbitrary commands through specially crafted network requests. Specifically, this vulnerability impacts the uclited service on the EAP115(V4) 5.0.4 Build 20220216 of the N300 Wireless Gigabit Access Point. An attacker can trigger this vulnerability by sending a sequence of unauthenticated packets to the affected device (CERT-FR).

Impact

The vulnerability allows remote attackers to execute arbitrary commands on affected devices without requiring authentication. This could potentially lead to complete compromise of the affected access points, allowing attackers to gain unauthorized control over the device (CERT-FR).

Mitigation and workarounds

The affected devices should be updated to the latest firmware versions provided by TP-Link. Organizations using the affected access points should ensure their devices are running the most recent firmware to protect against this vulnerability (CERT-FR).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management