Products
Archer C4500X
- through 1_1.1.6
Source
research@onekey.com
Tags
CVE-2024-5035 details
Published : May 27, 2024, 8:15 a.m.
Last Modified : May 27, 2024, 8:15 a.m.
Last Modified : May 27, 2024, 8:15 a.m.
Description
The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
References
URL | Source |
---|---|
https://onekey.com/blog/security-advisory-remote-command-execution-on-tp-link-archer-c5400x/ | research@onekey.com |
https://www.tp-link.com/en/support/download/archer-c5400x/#Firmware | research@onekey.com |
This website uses the NVD API, but is not approved or certified by it.