This vulnerability allows local attackers to escalate privileges on affected installations of TP-Link Archer A7 AC1750 routers. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the file system. The issue lies in the lack of proper permissions set on the file system. An attacker can leverage this vulnerability to escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer A7 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-9651 is high, as it allows local attackers to escalate privileges on affected TP-Link Archer A7 routers.
To fix ZDI-CAN-9651, update the TP-Link Archer A7 router to the latest firmware version provided by TP-Link.
ZDI-CAN-9651 affects TP-Link Archer A7 AC1750 routers that are running vulnerable firmware versions.
ZDI-CAN-9651 facilitates local privilege escalation attacks against the TP-Link Archer A7 router.
No, remote access is not required for ZDI-CAN-9651; the attacker must have local access to the system.