Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
2023-09-06T10:15:13.770
2024-11-21T08:11:23.740
Modified
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | tp-link | archer_c20_firmware | < 230616 | Yes |
Hardware | tp-link | archer_c20 | 1 | No |