Lucene search

K
cvelistJpcertCVELIST:CVE-2023-39224
HistorySep 06, 2023 - 9:22 a.m.

CVE-2023-39224

2023-09-0609:22:59
jpcert
www.cve.org
archer c5
archer c7
firmware
os command execution
vulnerability
network-adjacent
authenticated attacker

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.8%

Archer C5 firmware all versions and Archer C7 firmware versions prior to β€˜Archer C7(JP)_V2_230602’ allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided.

CNA Affected

[
  {
    "vendor": "TP-LINK",
    "product": "Archer C5",
    "versions": [
      {
        "version": "firmware all versions",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "TP-LINK",
    "product": "Archer C7",
    "versions": [
      {
        "version": "firmware versions prior to 'Archer C7(JP)_V2_230602'",
        "status": "affected"
      }
    ]
  }
]

8.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.8%

Related for CVELIST:CVE-2023-39224