Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44928 | Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'. |
Fri, 27 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tp-link:archer_a10_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_ax10_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_ax11000_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_ax50_firmware:-:*:*:*:*:*:*:* |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-09-27T20:07:01.652Z
Reserved: 2023-08-15T07:33:34.791Z
Link: CVE-2023-40357
Updated: 2024-08-02T18:31:53.663Z
Status : Modified
Published: 2023-09-06T10:15:14.820
Modified: 2024-11-21T08:19:17.597
Link: CVE-2023-40357
No data.
OpenCVE Enrichment
No data.
EUVD