Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://www.tp-link.com/jp/support/download/archer-c20/v1/#Firmware | product |
https://jvn.jp/en/vu/JVNVU99392903/ | third party advisory |