Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'.
History

Fri, 27 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer C20 Firmware
CPEs cpe:2.3:o:tp-link:archer_c20_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link archer C20 Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2023-09-06T09:28:18.168Z

Updated: 2024-09-27T20:50:29.101Z

Reserved: 2023-08-15T07:33:36.680Z

Link: CVE-2023-31188

cve-icon Vulnrichment

Updated: 2024-08-02T14:45:26.119Z

cve-icon NVD

Status : Modified

Published: 2023-09-06T10:15:13.183

Modified: 2024-11-21T08:01:35.460

Link: CVE-2023-31188

cve-icon Redhat

No data.