Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:o:tp-link:archer_c20_firmware:230616:*:*:*:*:*:*:* | |
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2023-09-06T09:24:42.525Z
Updated: 2024-09-26T20:41:42.264Z
Reserved: 2023-08-15T07:33:40.187Z
Link: CVE-2023-37284
Vulnrichment
Updated: 2024-08-02T17:09:34.039Z
NVD
Status : Modified
Published: 2023-09-06T10:15:13.770
Modified: 2024-11-21T08:11:23.740
Link: CVE-2023-37284
Redhat
No data.