CVE-2024-21821

Multiple TP-LINK products allow a network-adjacent authenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_ax3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax3000:1.0:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:archer_ax5400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax5400:1.0:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_axe75:1.0:*:*:*:*:*:*:*

History

03 Jul 2024, 23:15

Type Values Removed Values Added
Summary (en) Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115", Archer AX5400 firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115", and Archer AXE75 firmware versions prior to "Archer AXE75(JP)_V1_231115". (en) Multiple TP-LINK products allow a network-adjacent authenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands.
References
  • () https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware -

18 Jan 2024, 17:08

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
CPE cpe:2.3:o:tp-link:archer_ax3000_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax3000:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_ax5400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax5400:1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_axe75:1.0:*:*:*:*:*:*:*
CWE CWE-78
First Time Tp-link archer Ax3000
Tp-link archer Ax5400
Tp-link archer Axe75
Tp-link
Tp-link archer Axe75 Firmware
Tp-link archer Ax3000 Firmware
Tp-link archer Ax5400 Firmware
References () https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware - () https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware - Product
References () https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware - () https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware - Product
References () https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware - () https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware - Product
References () https://jvn.jp/en/vu/JVNVU91401812/ - () https://jvn.jp/en/vu/JVNVU91401812/ - Third Party Advisory

11 Jan 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-11 00:15

Updated : 2024-07-03 23:15


NVD link : CVE-2024-21821

Mitre link : CVE-2024-21821

CVE.ORG link : CVE-2024-21821


JSON object : View

Products Affected

tp-link

  • archer_ax5400
  • archer_axe75
  • archer_ax3000_firmware
  • archer_ax5400_firmware
  • archer_ax3000
  • archer_axe75_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')