Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51839 | In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution. |
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 09 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-04T19:14:14.345Z
Reserved: 2022-12-14T17:59:41.586Z
Link: CVE-2022-4498
Updated: 2025-11-04T19:14:14.345Z
Status : Modified
Published: 2023-01-11T21:15:10.213
Modified: 2025-11-04T20:16:15.240
Link: CVE-2022-4498
No data.
OpenCVE Enrichment
No data.
EUVD