First published: Wed Mar 15 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer AX21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-245 is critical due to its potential for remote code execution by attackers.
To fix ZDI-23-245, users should update their TP-Link Archer AX21 routers to the latest firmware version available from TP-Link.
ZDI-23-245 affects users of the TP-Link Archer AX21 routers that are connected to a network.
No, ZDI-23-245 requires network adjacency, meaning attackers must be on the same local network to exploit the vulnerability.
No, ZDI-23-245 can be exploited without requiring authentication, making it particularly dangerous.