Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tp-link archer C5
|
|
CPEs | cpe:2.3:h:tp-link:archer_c5:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_c7_firmware:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Tp-link archer C5
|
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2023-09-06T09:22:59.282Z
Updated: 2024-09-26T20:13:06.770Z
Reserved: 2023-08-15T07:33:33.886Z
Link: CVE-2023-39224
Vulnrichment
Updated: 2024-08-02T18:02:06.563Z
NVD
Status : Modified
Published: 2023-09-06T10:15:14.587
Modified: 2024-11-21T08:14:56.990
Link: CVE-2023-39224
Redhat
No data.