First published: Thu Dec 05 2024(Updated: )
This vulnerability exists in the TP-Link Archer C50 due to presence of terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the UART shell on the vulnerable device. Successful exploitation of this vulnerability could allow the attacker to obtain Wi-Fi credentials of the targeted system.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer C50 V3 |
Upgrade to Archer C50(EU)_V4_ 240917 https://static.tp-link.com/upload/firmware/2024/202411/20241125/Archer%20C50(EU)_V4_240917.zip
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-54127 is considered a high severity vulnerability due to the potential for physical access exploitation.
To fix CVE-2024-54127, ensure that physical access to the TP-Link Archer C50 device is restricted and consider implementing stricter access controls.
The TP-Link Archer C50 router is specifically affected by CVE-2024-54127 due to its unsecured terminal access.
The potential impacts of CVE-2024-54127 include unauthorized access to device settings and data compromise.
No, CVE-2024-54127 requires physical access to the device to exploit the vulnerability.