Description
Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42958 | Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided. |
References
History
Thu, 26 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link archer C5
|
|
| CPEs | cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link archer C5
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-26T20:13:06.770Z
Reserved: 2023-08-15T07:33:33.886Z
Link: CVE-2023-39224
Updated: 2024-08-02T18:02:06.563Z
Status : Modified
Published: 2023-09-06T10:15:14.587
Modified: 2024-11-21T08:14:56.990
Link: CVE-2023-39224
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD