First published: Wed Sep 06 2023(Updated: )
Archer C1200 firmware versions prior to 'Archer C1200(JP)_V2_230508' and Archer C9 firmware versions prior to 'Archer C9(JP)_V3_230508' allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands.
Credit: vultures@jpcert.or.jp vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer C1200 firmware | <230508 | |
TP-Link Archer C1200 | =2.0 | |
Tp-link Archer C9 Firmware | <230508 | |
TP-Link Archer C9 | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38563 is a vulnerability found in Archer C1200 and Archer C9 firmware versions prior to certain versions, which allows an unauthenticated attacker to execute arbitrary OS commands.
CVE-2023-38563 has a severity rating of 8.8, which is classified as high.
Archer C1200 firmware versions prior to 'Archer C1200(JP)_V2_230508' and Archer C9 firmware versions prior to 'Archer C9(JP)_V3_230508' are affected by CVE-2023-38563.
An unauthenticated attacker can exploit CVE-2023-38563 by executing arbitrary OS commands.
You can find more information about CVE-2023-38563 at the following references: - [JVN](https://jvn.jp/en/vu/JVNVU99392903/) - [TP-Link](https://www.tp-link.com/jp/support/download/archer-c1200/#Firmware) - [TP-Link](https://www.tp-link.com/jp/support/download/archer-c9/v3/#Firmware)