First published: Wed Sep 06 2023(Updated: )
Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505' and Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506' use hard-coded credentials to login to the affected device, which may allow a network-adjacent unauthenticated attacker to execute an arbitrary OS command.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C55 Firmware | <230506 | |
Tp-link Archer C55 | ||
Tp-link Archer C50 V3 Firmware | <230505 | |
Tp-link Archer C50 V3 | ||
All of | ||
Tp-link Archer C55 Firmware | <230506 | |
Tp-link Archer C55 | ||
All of | ||
Tp-link Archer C50 V3 Firmware | <230505 | |
Tp-link Archer C50 V3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-32619.
The severity of CVE-2023-32619 is high with a CVSS score of 8.8.
Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505' and Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506' are affected.
CVE-2023-32619 allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command.
To fix CVE-2023-32619, update your Archer C50 firmware to 'Archer C50(JP)_V3_230505' or later, and update your Archer C55 firmware to 'Archer C55(JP)_V1_230506' or later.