First published: Wed Jan 10 2024(Updated: )
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tp-link Archer Ax3000 Firmware | <1.1.2 | |
Tp-link Archer Ax3000 | =1.0 | |
All of | ||
Tp-link Archer Ax5400 Firmware | <1.1.2 | |
Tp-link Archer Ax5400 | =1.0 | |
All of | ||
Tp-link Deco X50 Firmware | <1.4.1 | |
Tp-link Deco X50 | =1.0 | |
All of | ||
Tp-link Deco Xe200 Firmware | <1.2.5 | |
Tp-link Deco Xe200 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21773 has been classified with a high severity level due to its ability to allow unauthenticated attackers to execute arbitrary OS commands.
Mitigation for CVE-2024-21773 involves updating affected TP-LINK products to the latest firmware version as provided by the manufacturer.
CVE-2024-21773 affects several TP-LINK models, including Archer AX3000, Archer AX5400, Deco X50, and Deco XE200 with specific firmware versions.
Exploitation of CVE-2024-21773 may allow attackers to execute arbitrary OS commands, potentially compromising device integrity and security.
Yes, CVE-2024-21773 specifically involves vulnerabilities associated with the parental control settings on TP-LINK devices.