Tp Link Tl Wr902ac Firmware
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Tp Link Tl Wr902ac Firmware.
By the Year
In 2026 there have been 0 vulnerabilities in Tp Link Tl Wr902ac Firmware. Tl Wr902ac Firmware did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 1 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 1 | 8.80 |
It may take a day or so for new Tl Wr902ac Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Tp Link Tl Wr902ac Firmware Security Vulnerabilities
TP-Link TL-WR902AC libcmm.so Buffer Overflow RCE
CVE-2023-50225
- May 03, 2024
TP-Link TL-WR902AC dm_fillObjByStr Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR902AC routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the libcmm.so module. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-21819.
TP-Link TL-WR902AC Exec via Insecure Firmware Upload before V3 0.9.1
CVE-2022-48194
8.8 - High
- December 30, 2022
TP-Link TL-WR902AC devices through V3 0.9.1 allow remote authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) by uploading a crafted firmware update because the signature check is inadequate.
Unrestricted File Upload
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Tp Link Tl Wr902ac Firmware or by Tp Link? Click the Watch button to subscribe.