First published: Tue Mar 05 2024(Updated: )
Cross-Site Scripting (XSS) vulnerability stored in TP-Link Archer AX50 affecting firmware version 1.0.11 build 2022052. This vulnerability could allow an unauthenticated attacker to create a port mapping rule via a SOAP request and store a malicious JavaScript payload within that rule, which could result in an execution of the JavaScript payload when the rule is loaded.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer AX50 | ||
All of | ||
=1.0.11 | ||
Update the firmware to Archer AX50(EU)_V1_1.0.14 build 20240108.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2188 has been classified as a high-severity Cross-Site Scripting (XSS) vulnerability.
To mitigate CVE-2024-2188, update the firmware of the TP-Link Archer AX50 to version 1.0.11 or later.
CVE-2024-2188 affects the TP-Link Archer AX50 with firmware version 1.0.11 build 2022052.
CVE-2024-2188 is a Cross-Site Scripting (XSS) vulnerability that allows attackers to inject malicious scripts.
Yes, CVE-2024-2188 can be exploited by unauthenticated attackers remotely through a SOAP request.