Privilege Escalation Vulnerability in TP-Link Archer A7 Router Firmware
CVE-2020-10883

5.3MEDIUM

Key Information:

Vendor
Tp-link
Status
Vendor
CVE Published:
25 March 2020

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A privilege escalation vulnerability in TP-Link Archer A7 Firmware versions allows local attackers to gain elevated permissions. This flaw arises from inadequate file system permissions, which can be exploited after the attacker has localized access to execute low-privileged code. By leveraging this vulnerability, attackers can potentially execute unauthorized actions within the system. The issue has been identified in ZDI-CAN-9651, and users are advised to apply appropriate security measures to mitigate potential threats.

Affected Version(s)

Archer A7 Firmware Ver: 190726

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Pedro Ribeiro and Radek Domanski of Team Flashback
.