### [CVE-2022-24021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24021) ![](https://img.shields.io/static/v1?label=Product&message=LinkHub%20Mesh%20Wifi&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20MS1G_00_01.00_14%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%3A%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen) ### Description A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the online_process binary. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463 #### Github No PoCs found on GitHub currently.