Improper authentication vulnerability in Archer C20 firmware versions prior to ‘Archer C20(JP)_V1_230616’ allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
[
{
"cpes": [
"cpe:2.3:o:tp-link:archer_c20_firmware:230616:*:*:*:*:*:*:*"
],
"vendor": "tp-link",
"product": "archer_c20_firmware",
"versions": [
{
"status": "affected",
"version": "v1_230616"
}
],
"defaultStatus": "unknown"
}
]