Описание
Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2024-38471
- https://jvn.jp/en/vu/JVNVU99784493
- https://www.tp-link.com/jp/support/download
- https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware
- https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware
- https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware
- https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware
- https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware
Связанные уязвимости
Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
Уязвимость микропрограммного обеспечения Wi‑Fi роутеров TP-Link Archer AX3000, Archer AXE75, Archer AX5400, Archer Air R5 и Archer AXE5400, существующая из-за непринятия мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю выполнять произвольные команды