First published: Tue Aug 01 2023(Updated: )
TP-Link Archer AX21(US)_V3_1.1.4 Build 20230219 and AX21(US)_V3.6_1.1.4 Build 20230219 are vulnerable to Buffer Overflow.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer Ax21 Firmware | =3.6_1.1.4 | |
Tp-link Archer Ax21 Firmware | =3_1.1.4 | |
TP-Link Archer AX21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31710 is a vulnerability in TP-Link Archer AX21(US)_V3_1.1.4 Build 20230219 and AX21(US)_V3.6_1.1.4 Build 20230219 that allows for buffer overflow.
CVE-2023-31710 has a severity rating of 9.8 (critical).
TP-Link Archer AX21 firmware versions 3.1.4 and 3.6_1.1.4 are affected by CVE-2023-31710.
To fix CVE-2023-31710, it is recommended to update the firmware of TP-Link Archer AX21 to a patched version provided by the vendor.
More information about CVE-2023-31710 can be found at the following reference link: [CVE-2023-31710 Reference](https://github.com/xiaobye-ctf/My-CVE/tree/main/TP-Link/CVE-2023-31710)