Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19387 | Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings. |
Tue, 03 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-06-03T14:26:17.285Z
Reserved: 2024-01-04T00:17:51.152Z
Link: CVE-2024-21773
Updated: 2024-08-01T22:27:36.316Z
Status : Modified
Published: 2024-01-11T00:15:44.560
Modified: 2025-06-03T15:15:56.360
Link: CVE-2024-21773
No data.
OpenCVE Enrichment
No data.
EUVD