Medium severity6.8NVD Advisory· Published Jul 4, 2024· Updated Apr 15, 2026
CVE-2024-38471
CVE-2024-38471
Description
Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- jvn.jp/en/vu/JVNVU99784493/nvd
- www.tp-link.com/jp/support/download/nvd
- www.tp-link.com/jp/support/download/archer-air-r5/v1/nvd
- www.tp-link.com/jp/support/download/archer-ax3000/nvd
- www.tp-link.com/jp/support/download/archer-ax5400/nvd
- www.tp-link.com/jp/support/download/archer-axe5400/nvd
- www.tp-link.com/jp/support/download/archer-axe75/nvd
News mentions
0No linked articles in our index yet.