First published: Tue Feb 18 2025(Updated: )
A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-LINK Archer C20 | <V6.6_230412 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-57049 is considered to be high due to the ability to bypass authentication on the TP-Link Archer C20 router.
To fix CVE-2024-57049, update the firmware of the TP-Link Archer C20 router to a version later than V6.6_230412.
Exploiting CVE-2024-57049 may allow unauthorized users to access sensitive router interfaces and configurations.
CVE-2024-57049 affects TP-Link Archer C20 routers running firmware version V6.6_230412 and earlier.
CVE-2024-57049 has been identified as a vulnerability, but any active exploitation details are currently not publicly disclosed.