Lucene search

K
cvelistJpcertCVELIST:CVE-2024-21821
HistoryJan 10, 2024 - 11:25 p.m.

CVE-2024-21821

2024-01-1023:25:07
jpcert
www.cve.org
4
tp-link
command execution
archer ax3000
archer ax5400
archer axe75
firmware

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

37.1%

Multiple TP-LINK products allow a network-adjacent authenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands.

CNA Affected

[
  {
    "vendor": "TP-Link",
    "product": "Archer AX3000",
    "versions": [
      {
        "version": "firmware versions prior to \"Archer AX3000(JP)_V1_1.1.2 Build 20231115\"",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "TP-Link",
    "product": "Archer AX5400",
    "versions": [
      {
        "version": "firmware versions prior to \"Archer AX5400(JP)_V1_1.1.2 Build 20231115\"",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "TP-Link",
    "product": "Archer AXE75",
    "versions": [
      {
        "version": "firmware versions prior to \"Archer AXE75(JP)_V1_231115\"",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "TP-Link",
    "product": "Archer Air R5",
    "versions": [
      {
        "version": "firmware versions prior to \"Archer Air R5(JP)_V1_1.1.6 Build 20240508\"",
        "status": "affected"
      }
    ]
  }
]

AI Score

8.2

Confidence

High

EPSS

0.001

Percentile

37.1%

Related for CVELIST:CVE-2024-21821