CVE-2023-40357 Vulnerability Details
/
/
/
CVE-2023-40357 Metadata Quick Info
CVE Published: 06/09/2023 |
CVE Updated: 27/09/2024 |
CVE Year: 2023
Source: jpcert |
Vendor: TP-LINK |
Product: Archer AX50
Status : PUBLISHED
CVE-2023-40357 Description
Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to \'Archer AX50(JP)_V1_230529\', Archer A10 firmware versions prior to \'Archer A10(JP)_V2_230504\', Archer AX10 firmware versions prior to \'Archer AX10(JP)_V1.2_230508\', and Archer AX11000 firmware versions prior to \'Archer AX11000(JP)_V1_230523\'.
Metrics
CVSS Version: 3.1 |
Base Score: n/a
Vector: n/a
l➤ Exploitability Metrics:
Attack Vector (AV)*
Attack Complexity (AC)*
Privileges Required (PR)*
User Interaction (UI)*
Scope (S)*
l➤ Impact Metrics:
Confidentiality Impact (C)*
Integrity Impact (I)*
Availability Impact (A)*
Weakness Enumeration (CWE)
CWE-ID:
CWE Name: OS command injection
Source: TP-LINK
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID:
CAPEC Description:
Source: NVD (National Vulnerability Database).