First published: Wed Sep 06 2023(Updated: )
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-WR841N(JP)_V14_230506', and TL-WR902AC firmware versions prior to 'TL-WR902AC(JP)_V3_230506'.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr902ac Firmware | <230506 | |
TP-Link TL-WR902AC | ||
Tp-link Tl-wr802n Firmware | <221008 | |
TP-Link TL-WR802N | ||
Tp-link Tl-wr841n Firmware | <230506 | |
TP-LINK TL-WR841N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this TP-LINK product vulnerability is CVE-2023-36489.
The severity of CVE-2023-36489 is high with a CVSS score of 8.8.
The TP-LINK products affected by CVE-2023-36489 are TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-WR841N(JP)_V14_230506', and TL-WR902AC firmware versions up to 230506.
An unauthenticated attacker who is network-adjacent can exploit CVE-2023-36489 by executing arbitrary OS commands.
Yes, TP-LINK TL-WR902AC, TL-WR802N, and TL-WR841N devices are vulnerable to CVE-2023-36489 if they are running the firmware versions mentioned.