Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.
2024-01-11T00:15:44.560
2025-06-03T15:15:56.360
Modified
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | tp-link | archer_ax3000_firmware | < 1.1.2 | Yes |
Hardware | tp-link | archer_ax3000 | 1.0 | No |
Operating System | tp-link | archer_ax5400_firmware | < 1.1.2 | Yes |
Hardware | tp-link | archer_ax5400 | 1.0 | No |
Operating System | tp-link | deco_x50_firmware | < 1.4.1 | Yes |
Hardware | tp-link | deco_x50 | 1.0 | No |
Operating System | tp-link | deco_xe200_firmware | < 1.2.5 | Yes |
Hardware | tp-link | deco_xe200 | 1.0 | No |