Archer AX10 Router Vulnerability Allows Code Execution by Authenticated Attackers
CVE-2022-40486
8.8HIGH
Summary
The TP Link Archer AX10 router firmware version 1.3.1 allows authenticated attackers to exploit a vulnerability by uploading a specially crafted backup file. This oversight enables attackers to execute arbitrary code on the device, potentially compromising its security and functionality. Users of this router model should be aware of this risk and apply necessary security updates promptly to protect their networks.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved