This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tmpServer service, which listens on TCP port 20002. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A7 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-339 is critical due to the potential for remote code execution without authentication.
To fix ZDI-20-339, update your TP-Link Archer A7 router firmware to the latest version provided by the manufacturer.
ZDI-20-339 can be exploited by remote attackers to execute arbitrary code on the affected TP-Link Archer A7 router.
The devices affected by ZDI-20-339 are TP-Link Archer A7 AC1750 routers.
No, authentication is not required to exploit the ZDI-20-339 vulnerability.