First published: Wed Sep 06 2023(Updated: )
Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C55 Firmware | <230506 | |
Tp-link Archer C55 | ||
Tp-link Archer C50 V3 Firmware | <230505 | |
Tp-link Archer C50 V3 | ||
All of | ||
Tp-link Archer C55 | ||
Tp-link Archer C55 Firmware | <230506 | |
All of | ||
Tp-link Archer C50 V3 | ||
Tp-link Archer C50 V3 Firmware | <230505 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-31188 is high.
The TP-LINK products affected by CVE-2023-31188 include Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions.
An authenticated attacker who is network-adjacent can exploit CVE-2023-31188 to execute arbitrary OS commands.
You can find more information about CVE-2023-31188 at the following references: [Reference 1](https://jvn.jp/en/vu/JVNVU99392903/), [Reference 2](https://www.tp-link.com/jp/support/download/archer-c20/v1/#Firmware), [Reference 3](https://www.tp-link.com/jp/support/download/archer-c50/v3/#Firmware).
The Common Weakness Enumeration (CWE) for CVE-2023-31188 is CWE-78.