TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.
References
Link | Resource |
---|---|
https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md | Exploit Third Party Advisory |
https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/ | Product |
https://www.tp-link.com/br/support/download/archer-ax10/v1/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-09-28 06:15
Updated : 2022-09-30 08:40
NVD link : CVE-2022-40486
Mitre link : CVE-2022-40486
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
tp-link
- archer_ax10_v1_firmware
- archer_ax10_v1