Remote Code Execution Vulnerability in TP-Link Archer Routers
CVE-2024-53375

8HIGH

Key Information:

Vendor

TP-Link

Vendor
CVE Published:
2 December 2024

Badges

💰 Ransomware👾 Exploit Exists🟣 EPSS 74%📰 News Worthy

What is CVE-2024-53375?

The vulnerability CVE-2024-53375 affects TP-Link routers, allowing attackers to execute remote code and inject malicious commands, leading to potential exploitation of the devices. The vulnerability affects the HomeShield functionality and can be exploited without the installation or activation of the HomeShield functionality. The flaw resides in the firmware of the routers, allowing attackers to execute arbitrary commands with root privileges, gaining full control over the device. It is important for TP-Link users to update their router firmware as soon as TP-Link releases a patch to mitigate the risk of exploitation.

News Articles

ShadowV2 Botnet Activity Quietly Intensified During AWS Outage - IT Security News

  The recently discovered wave of malicious activity has raised fresh concerns for cybersecurity analysts, who claim that ShadowV2 – a fast-evolving strain of malware that is quietly assembling a global network of compromised devices – is quietly causing alarm.…Read more →

New ShadowV2 botnet malware used AWS outage as a test opportunity

A new Mirai-based botnet malware named 'ShadowV2' has been observed targeting IoT devices from D-Link, TP-Link, and other vendors with exploits for known vulnerabilities.

TP-Link HomeShield Function Vulnerability Let Attackers Inject Malicious Commands

A significant vulnerability has been identified in TP-Link's HomeShield function, affecting a range of their devices, including the Archer, Deco, and Tapo series routers.

References

EPSS Score

74% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by GBHackers News

  • Vulnerability published

  • Vulnerability Reserved

.