CVE-2023-31756

A command injection vulnerability exists in the administrative web portal in TP-Link Archer VR1600V devices running firmware Versions <= 0.1.0. 0.9.1 v5006.0 Build 220518 Rel.32480n which allows remote attackers, authenticated to the administrative web portal as an administrator user to open an operating system level shell via the 'X_TP_IfName' parameter.
References
Link Resource
https://stanleyjobsonau.github.io/tp-link-advisory.html Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_vr1600v_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_vr1600v:-:*:*:*:*:*:*:*

History

26 May 2023, 17:35

Type Values Removed Values Added
CWE CWE-78
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
First Time Tp-link
Tp-link archer Vr1600v Firmware
Tp-link archer Vr1600v
CPE cpe:2.3:h:tp-link:archer_vr1600v:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_vr1600v_firmware:*:*:*:*:*:*:*:*
References (MISC) https://stanleyjobsonau.github.io/tp-link-advisory.html - (MISC) https://stanleyjobsonau.github.io/tp-link-advisory.html - Exploit, Technical Description, Third Party Advisory

Information

Published : 2023-05-19 13:15

Updated : 2024-02-28 20:13


NVD link : CVE-2023-31756

Mitre link : CVE-2023-31756

CVE.ORG link : CVE-2023-31756


JSON object : View

Products Affected

tp-link

  • archer_vr1600v
  • archer_vr1600v_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')