First published: Mon Apr 24 2023(Updated: )
This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link EX20v AX1800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-23-452 vulnerability is classified as a high severity issue due to its potential for remote exploitation without authentication.
To fix ZDI-23-452, users should update their TP-Link Archer AX21 routers to the latest firmware version provided by the vendor.
ZDI-23-452 allows remote attackers to access LAN-side services, potentially compromising the security of the entire network.
No, authentication is not required to exploit the ZDI-23-452 vulnerability, making it particularly dangerous.
The ZDI-23-452 vulnerability affects users of TP-Link Archer AX21 routers that have not been updated to mitigate the vulnerability.