First published: Wed Jan 10 2024(Updated: )
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tp-link Archer Ax3000 Firmware | <1.1.2 | |
Tp-link Archer Ax3000 | =1.0 | |
All of | ||
Tp-link Archer Ax5400 Firmware | <1.1.2 | |
Tp-link Archer Ax5400 | =1.0 | |
All of | ||
Tp-link Deco X50 Firmware | <1.4.1 | |
Tp-link Deco X50 | =1.0 | |
All of | ||
Tp-link Deco Xe200 Firmware | <1.2.5 | |
Tp-link Deco Xe200 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.