The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6.
Solution:
Workaround:
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
https://onekey.com/blog/security-advisory-remote-command-execution-on-tp-link-archer-c5400x/ | third party advisory |
https://www.tp-link.com/en/support/download/archer-c5400x/#Firmware | release notes vendor advisory |