Privilege Escalation Vulnerability in TP-Link Archer A7 Router Firmware
CVE-2020-10883
Key Information:
Badges
Summary
A privilege escalation vulnerability in TP-Link Archer A7 Firmware versions allows local attackers to gain elevated permissions. This flaw arises from inadequate file system permissions, which can be exploited after the attacker has localized access to execute low-privileged code. By leveraging this vulnerability, attackers can potentially execute unauthorized actions within the system. The issue has been identified in ZDI-CAN-9651, and users are advised to apply appropriate security measures to mitigate potential threats.
Affected Version(s)
Archer A7 Firmware Ver: 190726
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved