TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router.
References
Link | Resource |
---|---|
http://archer.com | Not Applicable |
http://tp-link.com | Vendor Advisory |
https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7%28US%29_V5_20519_tddp.md | |
http://archer.com | Not Applicable |
http://tp-link.com | Vendor Advisory |
https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7%28US%29_V5_20519_tddp.md |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://archer.com - Not Applicable | |
References | () http://tp-link.com - Vendor Advisory | |
References | () https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7%28US%29_V5_20519_tddp.md - |
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-08-23 01:15
Updated : 2024-11-21 06:27
NVD link : CVE-2021-42232
Mitre link : CVE-2021-42232
CVE.ORG link : CVE-2021-42232
JSON object : View
Products Affected
tp-link
- archer_a7_firmware
- archer_a7
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')