Archer C1200 firmware versions prior to 'Archer C1200(JP)_V2_230508' and Archer C9 firmware versions prior to 'Archer C9(JP)_V3_230508' allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands.
References
Link | Resource |
---|---|
https://jvn.jp/en/vu/JVNVU99392903/ | Third Party Advisory |
https://www.tp-link.com/jp/support/download/archer-c1200/#Firmware | Product |
https://www.tp-link.com/jp/support/download/archer-c9/v3/#Firmware | Product |
Configurations
History
No history.
Information
Published : 2023-09-06 10:15
Updated : 2023-09-11 13:39
NVD link : CVE-2023-38563
Mitre link : CVE-2023-38563
CVE.ORG link : CVE-2023-38563
JSON object : View
Products Affected
tp-link
- archer_c1200_firmware
- archer_c9_firmware
- archer_c1200
- archer_c9
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')