← Back to CVEs
CVE-2022-4498
CRITICAL9.8
Description
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published1/11/2023
Last Modified11/4/2025
Sourcenvd
Honeypot Sightings0
Affected Products
tp-link:archer_c5tp-link:archer_c5_firmwaretp-link:tl-wr710ntp-link:tl-wr710n_firmware
Weaknesses (CWE)
CWE-787
References
https://kb.cert.org/vuls/id/572615(cret@cert.org)
https://kb.cert.org/vuls/id/572615(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/572615(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.