VYPR
Unrated severityNVD Advisory· Published Sep 6, 2023· Updated Sep 27, 2024

CVE-2023-40357

CVE-2023-40357

Description

Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'.

Affected products

4
  • TP-LINK/Archer A10v5
    Range: firmware versions prior to 'Archer A10(JP)_V2_230504'
  • TP-Link/Archer AX1500cpe-rescue2 versions
    firmware versions prior to 'Archer AX10(JP)_V1.2_230508'+ 1 more
    • (no CPE)range: firmware versions prior to 'Archer AX10(JP)_V1.2_230508'
    • (no CPE)range: firmware versions prior to 'Archer AX11000(JP)_V1_230523'
  • Range: firmware versions prior to 'Archer AX50(JP)_V1_230529'

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.