First published: Thu Dec 05 2024(Updated: )
This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this vulnerability by uploading and executing malicious firmware which could lead to complete compromise of the targeted device.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer C50 V3 |
Upgrade to Archer C50(EU)_V4_ 240917 https://static.tp-link.com/upload/firmware/2024/202411/20241125/Archer%20C50(EU)_V4_240917.zip
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54126 has a high severity due to the potential for remote code execution via improper signature verification during firmware upgrades.
To fix CVE-2024-54126, update the TP-Link Archer C50 firmware to the latest version provided by TP-Link.
Users of the TP-Link Archer C50 router are affected by CVE-2024-54126, particularly those with administrative access.
CVE-2024-54126 allows an attacker with administrative privileges to upload and execute malicious firmware.
While there is no specific workaround for CVE-2024-54126, reducing administrative access and regularly updating firmware can mitigate risks.