First published: Wed Jan 10 2024(Updated: )
Multiple TP-LINK products allow a network-adjacent authenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tp-link Archer Ax3000 Firmware | <1.1.2 | |
Tp-link Archer Ax3000 | =1.0 | |
All of | ||
Tp-link Archer Ax5400 Firmware | <1.1.2 | |
Tp-link Archer Ax5400 | =1.0 | |
All of | ||
Tp-link Archer Axe75 Firmware | <1.1.9 | |
Tp-link Archer Axe75 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21821 is classified as a high severity vulnerability due to the ability for network-adjacent attackers to execute arbitrary OS commands.
To fix CVE-2024-21821, update the affected TP-LINK products to the latest firmware version provided by the manufacturer.
CVE-2024-21821 affects multiple TP-LINK products including the Archer AX3000, Archer AX5400, and Archer AXE75 with specific firmware versions.
CVE-2024-21821 can be exploited by authenticated attackers on the local network to execute arbitrary commands on the affected devices.
CVE-2024-21821 is not remotely exploitable as it requires network adjacency and authentication to the vulnerable TP-LINK devices.