Security vulnerabilities have been disclosed in Netcomm and TP-Backlink routers, some of which could be weaponized to achieve remote code execution.
The flaws, tracked as CVE-2022-4873 and CVE-2022-4874, problem a circumstance of stack-based buffer overflow and authentication bypass and impact Netcomm router types NF20MESH, NF20, and NL1902 jogging software versions previously than R6B035.
“The two vulnerabilities, when chained together, permit a remote, unauthenticated attacker to execute arbitrary code,” the CERT Coordination Heart (CERT/CC) explained in an advisory released Tuesday.
“The attacker can 1st gain unauthorized access to influenced units, and then use these entry factors to obtain access to other networks or compromise the availability, integrity, or confidentiality of data remaining transmitted from the inner network.”
Security researcher Brendan Scarvell has been credited with finding and reporting the issues in October 2022.
In a related development, CERT/CC also in-depth two unpatched security vulnerabilities influencing TP-Backlink routers WR710N-V1-151022 and Archer-C5-V2-160201 that could lead to details disclosure (CVE-2022-4499) and distant code execution (CVE-2022-4498).
CVE-2022-4499 is also a facet-channel attack targeting a purpose used to validate the entered qualifications. “By measuring the response time of the vulnerable course of action, every single byte of the username and password strings might be less complicated to guess,” CERT/CC explained.
Microsoft researcher James Hull has been acknowledged for disclosing the two bugs. The Hacker News has attained out to TP-Hyperlink for a comment, and we will update the tale if we listen to back again.
Uncovered this write-up interesting? Adhere to us on Twitter and LinkedIn to read extra special content material we article.
Some parts of this article are sourced from:
thehackernews.com