First published: Sat Nov 21 2020(Updated: )
UNIX Symbolic Link (Symlink) Following in TP-Link Archer C9(US)_V1_180125 firmware allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.
Credit: vulnreport@tenable.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C9 Firmware | =180125 | |
TP-Link Archer C9 | =v1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-5797.
The severity of CVE-2020-5797 is medium.
The vulnerability allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.
TP-Link Archer C9(US)_V1_180125 firmware is affected by CVE-2020-5797.
No, TP-Link Archer C9v1 firmware is not vulnerable to CVE-2020-5797.