First published: Wed Jan 10 2024(Updated: )
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
<1.1.2 | ||
=1.0 | ||
All of | ||
<1.1.2 | ||
=1.0 | ||
All of | ||
<1.4.1 | ||
=1.0 | ||
All of | ||
<1.2.5 | ||
=1.0 | ||
All of | ||
<1.1.9 | ||
=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.