TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md | third party advisory exploit |
https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10/ | product |
https://www.tp-link.com/br/support/download/archer-ax10/v1/ | product |