Unauthenticated XSS Vulnerability in TP-Link Archer AX50 Firmware
CVE-2024-2188
6.1MEDIUM
Key Information
- Vendor
- Tp-link
- Status
- Archer Ax50
- Vendor
- CVE Published:
- 5 March 2024
Badges
👾 Exploit Exists🔴 Public PoC
Summary
Cross-Site Scripting (XSS) vulnerability stored in TP-Link Archer AX50 affecting firmware version 1.0.11 build 2022052. This vulnerability could allow an unauthenticated attacker to create a port mapping rule via a SOAP request and store a malicious JavaScript payload within that rule, which could result in an execution of the JavaScript payload when the rule is loaded.
Affected Version(s)
Archer AX50 = 1.0.11 build 2022052
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
- 👾
Exploit exists.
Vulnerability Reserved.
Vulnerability published.
Collectors
NVD DatabaseMitre Database1 Proof of Concept(s)
Credit
Victor Fresco Perales (@hacefresko)