Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-35504 | Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'. |
Fri, 27 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link archer C20 Firmware
|
|
| CPEs | cpe:2.3:o:tp-link:archer_c20_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Tp-link archer C20 Firmware
|
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-27T20:50:29.101Z
Reserved: 2023-08-15T07:33:36.680Z
Link: CVE-2023-31188
Updated: 2024-08-02T14:45:26.119Z
Status : Modified
Published: 2023-09-06T10:15:13.183
Modified: 2024-11-21T08:01:35.460
Link: CVE-2023-31188
No data.
OpenCVE Enrichment
No data.
EUVD