The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6.
CVSS
No CVSS.
References
Configurations
No configuration.
History
21 Nov 2024, 09:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://onekey.com/blog/security-advisory-remote-command-execution-on-tp-link-archer-c5400x/ - | |
References | () https://www.tp-link.com/en/support/download/archer-c5400x/#Firmware - |
28 May 2024, 12:39
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
27 May 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-27 08:15
Updated : 2024-11-21 09:46
NVD link : CVE-2024-5035
Mitre link : CVE-2024-5035
CVE.ORG link : CVE-2024-5035
JSON object : View
Products Affected
No product.
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')