Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided.
History

Thu, 26 Sep 2024 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer C5
CPEs cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:*
Vendors & Products Tp-link archer C5
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published: 2023-09-06T09:22:59.282Z

Updated: 2024-09-26T20:13:06.770Z

Reserved: 2023-08-15T07:33:33.886Z

Link: CVE-2023-39224

cve-icon Vulnrichment

Updated: 2024-08-02T18:02:06.563Z

cve-icon NVD

Status : Modified

Published: 2023-09-06T10:15:14.587

Modified: 2024-11-21T08:14:56.990

Link: CVE-2023-39224

cve-icon Redhat

No data.