CVE-2024-21773
Published Jan 11, 2024
Last updated 4 months ago
Overview
- Description
- Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.
- Source
- vultures@jpcert.or.jp
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-78
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_ax3000:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "60E38020-7C23-4B8E-B04C-DCC67A386004" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_ax3000_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E511835-B9F8-48F6-85D0-92BD9EF6B93C", "versionEndExcluding": "1.1.2" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:archer_ax5400:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "76D439C9-D0A9-40C5-A91A-3FE205A0139D" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:archer_ax5400_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "116BFAEE-8C19-4101-9754-CD55C951AA34", "versionEndExcluding": "1.1.2" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:deco_x50:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B07192F7-E04C-43BA-9452-B970EF8796A7" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:deco_x50_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49F92855-4C16-4785-BCB0-DF648574AE5B", "versionEndExcluding": "1.4.1" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:tp-link:deco_xe200:1.0:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "92D840AF-F273-4B48-B8A2-4081E3D484A6" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:tp-link:deco_xe200_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E38052E-2386-4DE1-9E3C-E6C39B2720A8", "versionEndExcluding": "1.2.5" } ], "operator": "OR" } ], "operator": "AND" } ]