cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-48194,https://securityvulnerability.io/vulnerability/CVE-2022-48194,Remote Code Execution Vulnerability in TP-Link TL-WR902AC Devices,"The TP-Link TL-WR902AC devices, specifically version v3.0.9.1, are susceptible to a remote code execution vulnerability that allows authenticated attackers to exploit inadequate signature checks during firmware updates. This can lead to arbitrary code execution or a Denial of Service (DoS). Attackers can upload malicious firmware, potentially compromising the integrity and availability of the device, thus posing a significant security risk that affects users relying on this product for their networking needs.",Tp-link,Tl-wr902ac Firmware,8.8,HIGH,0.026559999212622643,false,,false,false,true,2022-12-29T10:32:23.000Z,true,false,false,,2022-12-30T00:00:00.000Z,0 CVE-2022-25074,https://securityvulnerability.io/vulnerability/CVE-2022-25074,Stack Overflow Vulnerability in TP-Link Router Models,"The TP-Link TL-WR902AC(US)_V3_191209 routers are vulnerable to a stack overflow in the DM_Fillobjbystr() function. This security weakness permits unauthenticated attackers to execute arbitrary code, posing significant risks to network security and device integrity.",Tp-link,Tl-wr902ac Firmware,9.8,CRITICAL,0.0022899999748915434,false,,false,false,false,,,false,false,,2022-02-24T15:15:00.000Z,0