This vulnerability allows local attackers to escalate privileges on affected installations of TP-Link Archer A7 AC1750 routers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the file system. The issue lies in the lack of proper permissions set on the file system. An attacker can leverage this vulnerability to escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A7 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-335 is categorized as a high-severity privilege escalation vulnerability.
To fix ZDI-20-335, you should update the TP-Link Archer A7 router to the latest firmware provided by TP-Link.
ZDI-20-335 affects users of the TP-Link Archer A7 AC1750 routers who have not applied the latest firmware updates.
ZDI-20-335 involves a local privilege escalation attack that requires initial low-privileged access to the device.
Mitigating ZDI-20-335 can be done by restricting physical access to the router and monitoring for unauthorized code execution.