TP-LINK Products Vulnerable to Arbitrary OS Command Execution via Backup File Restoration
CVE-2024-38471

Currently unrated

Key Information:

Vendor
Tp-link
Vendor
CVE Published:
4 July 2024

Summary

A vulnerability exists in multiple TP-LINK networking devices that permits a network-adjacent attacker with administrative access to execute arbitrary operating system commands. This can be accomplished by restoring a specially crafted backup file on the affected device. The devices typically allow login only from local area network (LAN) ports or Wi-Fi. It is essential for users of the affected TP-LINK products to apply available security updates and follow best practices for network security to mitigate this risk.

Affected Version(s)

Archer Air R5 firmware versions prior to "Archer Air R5(JP)_V1_1.1.6 Build 20240508"

Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.3 Build 20240415"

Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.4 Build 20240429"

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.