Lucene search

K
cve[email protected]CVE-2023-37284
HistorySep 06, 2023 - 10:15 a.m.

CVE-2023-37284

2023-09-0610:15:13
CWE-287
web.nvd.nist.gov
22
cve-2023-37284
archer c20
firmware
vulnerability
authentication
os command
bypass

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%

Improper authentication vulnerability in Archer C20 firmware versions prior to ‘Archer C20(JP)_V1_230616’ allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.

Affected configurations

NVD
Node
tp-linkarcher_c20_firmwareRange<230616
AND
tp-linkarcher_c20Match1

CNA Affected

[
  {
    "vendor": "TP-LINK",
    "product": "Archer C20",
    "versions": [
      {
        "version": "firmware versions prior to 'Archer C20(JP)_V1_230616'",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.1%

Related for CVE-2023-37284