Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36862 | Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505' and Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506' use hard-coded credentials to login to the affected device, which may allow a network-adjacent unauthenticated attacker to execute an arbitrary OS command. |
Thu, 26 Sep 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-26T20:19:58.978Z
Reserved: 2023-08-15T07:33:32.104Z
Link: CVE-2023-32619
Updated: 2024-08-02T15:25:35.693Z
Status : Modified
Published: 2023-09-06T10:15:13.650
Modified: 2024-11-21T08:03:42.880
Link: CVE-2023-32619
No data.
OpenCVE Enrichment
No data.
EUVD