TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.
References
Link | Resource |
---|---|
https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md | Exploit Third Party Advisory |
https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/ | Product |
https://www.tp-link.com/br/support/download/archer-ax10/v1/ | Product |
https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md | Exploit Third Party Advisory |
https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/ | Product |
https://www.tp-link.com/br/support/download/archer-ax10/v1/ | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md - Exploit, Third Party Advisory | |
References | () https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/ - Product | |
References | () https://www.tp-link.com/br/support/download/archer-ax10/v1/ - Product |
Information
Published : 2022-09-28 13:15
Updated : 2024-11-21 07:21
NVD link : CVE-2022-40486
Mitre link : CVE-2022-40486
CVE.ORG link : CVE-2022-40486
JSON object : View
Products Affected
tp-link
- archer_ax10_v1
- archer_ax10_v1_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')