CVE-2024-5035

The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6.
CVSS

No CVSS.

Configurations

No configuration.

History

21 Nov 2024, 09:46

Type Values Removed Values Added
References () https://onekey.com/blog/security-advisory-remote-command-execution-on-tp-link-archer-c5400x/ - () https://onekey.com/blog/security-advisory-remote-command-execution-on-tp-link-archer-c5400x/ -
References () https://www.tp-link.com/en/support/download/archer-c5400x/#Firmware - () https://www.tp-link.com/en/support/download/archer-c5400x/#Firmware -

28 May 2024, 12:39

Type Values Removed Values Added
Summary
  • (es) El dispositivo afectado expone un servicio de red llamado "rftest" que es vulnerable a la inyección de comandos no autenticados en los puertos TCP/8888, TCP/8889 y TCP/8890. Al explotar con éxito esta falla, un atacante remoto no autenticado puede obtener la ejecución de comandos arbitrarios en el dispositivo con privilegios elevados. Este problema afecta a Archer C4500X: hasta 1_1.1.6.

27 May 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-27 08:15

Updated : 2024-11-21 09:46


NVD link : CVE-2024-5035

Mitre link : CVE-2024-5035

CVE.ORG link : CVE-2024-5035


JSON object : View

Products Affected

No product.

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')