CVE-2022-40486

TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_ax10_v1_firmware:1.3.1:20220401:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax10_v1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:21

Type Values Removed Values Added
References () https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md - Exploit, Third Party Advisory () https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md - Exploit, Third Party Advisory
References () https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/ - Product () https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/ - Product
References () https://www.tp-link.com/br/support/download/archer-ax10/v1/ - Product () https://www.tp-link.com/br/support/download/archer-ax10/v1/ - Product

Information

Published : 2022-09-28 13:15

Updated : 2024-11-21 07:21


NVD link : CVE-2022-40486

Mitre link : CVE-2022-40486

CVE.ORG link : CVE-2022-40486


JSON object : View

Products Affected

tp-link

  • archer_ax10_v1
  • archer_ax10_v1_firmware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')