cvelist/2021/42xxx/CVE-2021-42232.json

72 lines
2.3 KiB
JSON
Raw Normal View History

2021-10-11 09:00:59 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-08-23 01:00:43 +00:00
"ID": "CVE-2021-42232",
"STATE": "PUBLIC"
2021-10-11 09:00:59 +00:00
},
2022-08-23 01:00:43 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-10-11 09:00:59 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-08-23 01:00:43 +00:00
"value": "TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://tp-link.com",
"refsource": "MISC",
"name": "http://tp-link.com"
},
{
"url": "http://archer.com",
"refsource": "MISC",
"name": "http://archer.com"
},
{
"refsource": "MISC",
"name": "https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7(US)_V5_20519_tddp.md",
"url": "https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7(US)_V5_20519_tddp.md"
2021-10-11 09:00:59 +00:00
}
]
}
}