First published: Wed Sep 06 2023(Updated: )
Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer C20 Firmware | <230616 | |
TP-LINK Archer C20 | =1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
This vulnerability is identified by the ID CVE-2023-37284.
The severity rating of CVE-2023-37284 is high, with a score of 8.8.
CVE-2023-37284 is an improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' that allows an unauthenticated attacker to execute arbitrary OS commands.
An attacker can exploit CVE-2023-37284 by sending a crafted request to the vulnerable device and bypassing authentication to execute OS commands.
Yes, TP-Link has released firmware version 'Archer C20(JP)_V1_230616' that addresses CVE-2023-37284. It is recommended to update to this version to fix the vulnerability.