CVE-2023-40357 Vulnerability Details

  /     /     /  

CVE-2023-40357 Metadata Quick Info

CVE Published: 06/09/2023 | CVE Updated: 27/09/2024 | CVE Year: 2023
Source: jpcert | Vendor: TP-LINK | Product: Archer AX50
Status : PUBLISHED

CVE-2023-40357 Description

Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to \'Archer AX50(JP)_V1_230529\', Archer A10 firmware versions prior to \'Archer A10(JP)_V2_230504\', Archer AX10 firmware versions prior to \'Archer AX10(JP)_V1.2_230508\', and Archer AX11000 firmware versions prior to \'Archer AX11000(JP)_V1_230523\'.

Metrics

CVSS Version: 3.1 | Base Score: n/a
Vector: n/a

l➤ Exploitability Metrics:
    Attack Vector (AV)*
    Attack Complexity (AC)*
    Privileges Required (PR)*
    User Interaction (UI)*
    Scope (S)*

l➤ Impact Metrics:
    Confidentiality Impact (C)*
    Integrity Impact (I)*
    Availability Impact (A)*

Weakness Enumeration (CWE)

CWE-ID:
CWE Name: OS command injection
Source: TP-LINK

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).