First published: Tue Jul 18 2023(Updated: )
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C2 V1 Firmware | =170228 | |
Tp-link Archer C2 V1 | ||
Tp-link Archer C20 Firmware | =150707 | |
TP-LINK Archer C20 | =1 | |
Tp-link Archer C50 Firmware | =160801 | |
TP-LINK Archer C50 | =2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-30383 is high with a severity value of 7.5.
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 are affected by CVE-2023-30383.
CVE-2023-30383 is a buffer overflow vulnerability that may lead to a Denial of Service (DoS) when parsing crafted data.
To fix CVE-2023-30383, update your TP-LINK Archer C50v2, Archer C20v1, and Archer C2v1 to the latest firmware version available.
You can find more information about CVE-2023-30383 on the TP-LINK website.