Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tp-link archer C20 Firmware
|
|
CPEs | cpe:2.3:o:tp-link:archer_c20_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Tp-link archer C20 Firmware
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2023-09-06T09:28:18.168Z
Updated: 2024-09-27T20:50:29.101Z
Reserved: 2023-08-15T07:33:36.680Z
Link: CVE-2023-31188
Vulnrichment
Updated: 2024-08-02T14:45:26.119Z
NVD
Status : Modified
Published: 2023-09-06T10:15:13.183
Modified: 2024-11-21T08:01:35.460
Link: CVE-2023-31188
Redhat
No data.