Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-40438 | Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-WR841N(JP)_V14_230506', and TL-WR902AC firmware versions prior to 'TL-WR902AC(JP)_V3_230506'. |
Thu, 26 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tp-link:tl-wr802n_firmware:221008:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr902ac_firmware:-:*:*:*:*:*:*:* |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-26T20:03:19.698Z
Reserved: 2023-08-15T07:33:33.018Z
Link: CVE-2023-36489
Updated: 2024-08-02T16:45:56.666Z
Status : Modified
Published: 2023-09-06T10:15:13.710
Modified: 2024-11-21T08:09:49.150
Link: CVE-2023-36489
No data.
OpenCVE Enrichment
No data.
EUVD