Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-53566 | An issue in TPLINK TL-WPA 8630 TL-WPA8630(US)_V2_2.0.4 Build 20230427 allows a remote attacker to execute arbitrary code via function sub_4256CC, which allows command injection by injecting 'devpwd'. |
| Link | Providers |
|---|---|
| https://github.com/c10uds/tplink-wpa8630-rce-vulnerability |
|
Thu, 03 Jul 2025 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tl-wpa8630 Tp-link tl-wpa8630 Firmware |
|
| CPEs | cpe:2.3:h:tp-link:tl-wpa8630:2.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wpa8630_firmware:2.0.4:build_20230427:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link
Tp-link tl-wpa8630 Tp-link tl-wpa8630 Firmware |
Fri, 07 Feb 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Fri, 07 Feb 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in TPLINK TL-WPA 8630 TL-WPA8630(US)_V2_2.0.4 Build 20230427 allows a remote attacker to execute arbitrary code via function sub_4256CC, which allows command injection by injecting 'devpwd'. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-02-07T23:04:09.719Z
Reserved: 2025-01-09T00:00:00.000Z
Link: CVE-2024-57357
Updated: 2025-02-07T23:03:53.606Z
Status : Analyzed
Published: 2025-02-07T22:15:13.630
Modified: 2025-07-03T01:10:04.600
Link: CVE-2024-57357
No data.
OpenCVE Enrichment
No data.
EUVD