Improper authentication vulnerability in Archer C20 firmware versions prior to βArcher C20(JP)_V1_230616β allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
[
{
"vendor": "TP-LINK",
"product": "Archer C20",
"versions": [
{
"version": "firmware versions prior to 'Archer C20(JP)_V1_230616'",
"status": "affected"
}
]
}
]