CVE-2022-43294 | Tasmota CRtspSession.cpp ClientPortPtr stack-based overflow
A vulnerability was found in Tasmota and classified as critical. Affected by this issue is some unknown functionality in the library lib/libesp32/rtsp/CRtspSession.cpp. The manipulation of the argument ClientPortPtr leads to stack-based buffer overflow.
This vulnerability is handled as CVE-2022-43294. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to apply a patch to fix this issue.