First published: Wed Sep 28 2022(Updated: )
TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer Ax10 V1 Firmware | =1.3.1-20220401 | |
Tp-link Archer Ax10 V1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40486 is a vulnerability in TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) that allows authenticated attackers to execute arbitrary code via a crafted backup file.
CVE-2022-40486 has a severity score of 8.8 (high).
To check if you are affected by CVE-2022-40486, verify that you have TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) installed.
To fix CVE-2022-40486, update your TP Link Archer AX10 V1 firmware to a version that has addressed the vulnerability.
You can find more information about CVE-2022-40486 on the GitHub repository (https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md) and the TP-Link website (https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/).