First published: Wed Mar 25 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tmpServer service, which listens on TCP port 20002. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current process.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A7 | ||
Tp-link Ac1750 Firmware | =190726 | |
TP-Link AC1750 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-10886.
The severity of the CVE-2020-10886 vulnerability is critical with a CVSS score of 9.8.
The affected software for CVE-2020-10886 is TP-Link Archer A7 Firmware Ver: 190726 AC1750 routers.
No, authentication is not required to exploit CVE-2020-10886.
Remote attackers can exploit CVE-2020-10886 by executing arbitrary code on affected installations of TP-Link Archer A7 routers.