Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2023-39224", "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "state": "PUBLISHED", "assignerShortName": "jpcert", "dateReserved": "2023-08-15T07:33:33.886Z", "datePublished": "2023-09-06T09:22:59.282Z", "dateUpdated": "2024-09-26T20:13:06.770Z"}, "containers": {"cna": {"affected": [{"vendor": "TP-LINK", "product": "Archer C5", "versions": [{"version": "firmware all versions", "status": "affected"}]}, {"vendor": "TP-LINK", "product": "Archer C7", "versions": [{"version": "firmware versions prior to 'Archer C7(JP)_V2_230602'", "status": "affected"}]}], "descriptions": [{"lang": "en", "value": "Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided."}], "problemTypes": [{"descriptions": [{"description": "OS command injection", "lang": "en", "type": "text"}]}], "references": [{"url": "https://www.tp-link.com/jp/support/download/archer-c7/v2/#Firmware"}, {"url": "https://jvn.jp/en/vu/JVNVU99392903/"}], "providerMetadata": {"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert", "dateUpdated": "2023-09-06T09:22:59.282Z"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T18:02:06.563Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.tp-link.com/jp/support/download/archer-c7/v2/#Firmware", "tags": ["x_transferred"]}, {"url": "https://jvn.jp/en/vu/JVNVU99392903/", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "tp-link", "product": "archer_c5", "cpes": ["cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "0", "status": "affected", "lessThan": "*", "versionType": "custom"}]}, {"vendor": "tp-link", "product": "archer_c7_firmware", "cpes": ["cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "v2_230602", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-09-26T20:11:36.456112Z", "id": "CVE-2023-39224", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-09-26T20:13:06.770Z"}}]}}