{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T02:34:57.853","vulnerabilities":[{"cve":{"id":"CVE-2022-46910","sourceIdentifier":"cve@mitre.org","published":"2022-12-20T20:15:11.027","lastModified":"2025-04-16T18:16:02.247","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An issue in the firmware update process of TP-Link TL-WA901ND V1 up to v3.11.2 and TL-WA901N V2 up to v3.12.16 allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image."},{"lang":"es","value":"Un problema en el proceso de actualización de firmware de TP-Link TL-WA901ND V1 hasta v3.11.2 y TL-WA901N V2 hasta v3.12.16 permite a atacantes ejecutar código arbitrario o provocar una Denegación de Servicio (DoS) mediante la carga de una imagen de firmware manipulada."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:tl-wa901n_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.11.2","matchCriteriaId":"B81EDABD-DC22-4B47-B66D-94CE4B28B078"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:tl-wa901n:-:*:*:*:*:*:*:*","matchCriteriaId":"6A34A828-66A6-4C7A-A38B-8B7191B9D7C1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:tl-wa901nd_v1_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.11.2","matchCriteriaId":"E1836A43-2987-47E9-81B6-3E0CDDA20BFA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:tl-wa901nd_v1:-:*:*:*:*:*:*:*","matchCriteriaId":"6DFDAF93-DAFA-461D-A98F-593A18C837AA"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:tl-wa901n_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.12.0","versionEndIncluding":"3.12.16","matchCriteriaId":"62FEFABB-23F1-40AC-B2B1-35E679424D29"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:tl-wa901n:-:*:*:*:*:*:*:*","matchCriteriaId":"6A34A828-66A6-4C7A-A38B-8B7191B9D7C1"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:tl-wa901nd_v2_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.12.16","matchCriteriaId":"BA588115-5435-4AD3-8D0E-5B9E0F4130D4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:tl-wa901nd_v2:-:*:*:*:*:*:*:*","matchCriteriaId":"B98201EF-F611-4CED-B990-024CBA4E3807"}]}]}],"references":[{"url":"https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BkwzORiDo","source":"cve@mitre.org"},{"url":"https://www.tp-link.com/us/press/security-advisory/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://hackmd.io/%40slASVrz_SrW7NQCsunofeA/BkwzORiDo","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.tp-link.com/us/press/security-advisory/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}