First published: Mon Dec 02 2024(Updated: )
An Authenticated Remote Code Execution (RCE) vulnerability affects the TP-Link Archer router series. A vulnerability exists in the "tmp_get_sites" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the activation of the HomeShield functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53375 is classified as a high severity vulnerability due to its potential for authenticated remote code execution.
To mitigate CVE-2024-53375, update your TP-Link Archer router's firmware to the latest version provided by TP-Link.
CVE-2024-53375 affects various models in the TP-Link Archer router series.
Yes, exploitation of CVE-2024-53375 is possible even if the HomeShield functionality is not activated.
CVE-2024-53375 allows an authenticated attacker to execute arbitrary code on affected TP-Link Archer routers.