CVE-2024-38471 (GCVE-0-2024-38471)

Vulnerability from cvelistv5 – Published: 2024-07-04 00:49 – Updated: 2025-03-13 13:17
VLAI?
Summary
Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
CWE
  • OS command injection
Assigner
Impacted products
Vendor Product Version
TP-LINK Archer AX3000 Affected: firmware versions prior to "Archer AX3000(JP)_V1_1.1.3 Build 20240415"
Create a notification for this product.
    TP-LINK Archer AXE75 Affected: firmware versions prior to "Archer AXE75(JP)_V1_1.2.0 Build 20240320"
Create a notification for this product.
    TP-LINK Archer AX5400 Affected: firmware versions prior to "Archer AX5400(JP)_V1_1.1.4 Build 20240429"
Create a notification for this product.
    TP-LINK Archer Air R5 Affected: firmware versions prior to "Archer Air R5(JP)_V1_1.1.6 Build 20240508"
Create a notification for this product.
    TP-LINK Archer AXE5400 Affected: firmware versions prior to "Archer AXE5400(JP)_V1_1.0.3 Build 20240319"
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:tp-link:archer_ax3000_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "archer_ax3000_firmware",
            "vendor": "tp-link",
            "versions": [
              {
                "lessThan": "v1_1.1.3_build_20240415",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "archer_axe75_firmware",
            "vendor": "tp-link",
            "versions": [
              {
                "lessThan": "v1_1.2.0_build_20240320",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:tp-link:archer_ax5400_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "archer_ax5400_firmware",
            "vendor": "tp-link",
            "versions": [
              {
                "lessThan": "v1_1.1.4_build_20240429",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:tp-link:archer_axe5400_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "archer_axe5400_firmware",
            "vendor": "tp-link",
            "versions": [
              {
                "lessThan": "v1_1.0.3_build_20240319",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:tp-link:archer_airr5_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "archer_airr5_firmware",
            "vendor": "tp-link",
            "versions": [
              {
                "lessThan": "v1_1.0.3_build_20240319",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "ADJACENT_NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.8,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-38471",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-05T13:55:09.966792Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-78",
                "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T13:17:03.724Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T04:12:25.043Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tp-link.com/jp/support/download/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/vu/JVNVU99784493/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Archer AX3000",
          "vendor": "TP-LINK",
          "versions": [
            {
              "status": "affected",
              "version": "firmware versions prior to \"Archer AX3000(JP)_V1_1.1.3 Build 20240415\""
            }
          ]
        },
        {
          "product": "Archer AXE75",
          "vendor": "TP-LINK",
          "versions": [
            {
              "status": "affected",
              "version": "firmware versions prior to \"Archer AXE75(JP)_V1_1.2.0 Build 20240320\""
            }
          ]
        },
        {
          "product": "Archer AX5400",
          "vendor": "TP-LINK",
          "versions": [
            {
              "status": "affected",
              "version": "firmware versions prior to \"Archer AX5400(JP)_V1_1.1.4 Build 20240429\""
            }
          ]
        },
        {
          "product": "Archer Air R5",
          "vendor": "TP-LINK",
          "versions": [
            {
              "status": "affected",
              "version": "firmware versions prior to \"Archer Air R5(JP)_V1_1.1.6 Build 20240508\""
            }
          ]
        },
        {
          "product": "Archer AXE5400",
          "vendor": "TP-LINK",
          "versions": [
            {
              "status": "affected",
              "version": "firmware versions prior to \"Archer AXE5400(JP)_V1_1.0.3 Build 20240319\""
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "OS command injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-04T00:49:13.216Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "url": "https://www.tp-link.com/jp/support/download/"
        },
        {
          "url": "https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware"
        },
        {
          "url": "https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware"
        },
        {
          "url": "https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware"
        },
        {
          "url": "https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware"
        },
        {
          "url": "https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware"
        },
        {
          "url": "https://jvn.jp/en/vu/JVNVU99784493/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2024-38471",
    "datePublished": "2024-07-04T00:49:13.216Z",
    "dateReserved": "2024-06-17T00:49:41.427Z",
    "dateUpdated": "2025-03-13T13:17:03.724Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples productos TP-LINK permiten a un atacante adyacente a la red con privilegios administrativos ejecutar comandos arbitrarios del sistema operativo mediante la restauraci\\u00f3n de un archivo de copia de seguridad manipulado. El dispositivo afectado, con la configuraci\\u00f3n inicial, permite iniciar sesi\\u00f3n \\u00fanicamente desde el puerto LAN o Wi-Fi.\"}]",
      "id": "CVE-2024-38471",
      "lastModified": "2024-11-21T09:26:01.303",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"ADJACENT_NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 5.9}]}",
      "published": "2024-07-04T01:15:02.400",
      "references": "[{\"url\": \"https://jvn.jp/en/vu/JVNVU99784493/\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware\", \"source\": \"vultures@jpcert.or.jp\"}, {\"url\": \"https://jvn.jp/en/vu/JVNVU99784493/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "vultures@jpcert.or.jp",
      "vulnStatus": "Awaiting Analysis"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-38471\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2024-07-04T01:15:02.400\",\"lastModified\":\"2025-03-13T14:15:28.513\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples productos TP-LINK permiten a un atacante adyacente a la red con privilegios administrativos ejecutar comandos arbitrarios del sistema operativo mediante la restauraci\u00f3n de un archivo de copia de seguridad manipulado. El dispositivo afectado, con la configuraci\u00f3n inicial, permite iniciar sesi\u00f3n \u00fanicamente desde el puerto LAN o Wi-Fi.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"references\":[{\"url\":\"https://jvn.jp/en/vu/JVNVU99784493/\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.tp-link.com/jp/support/download/\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"https://jvn.jp/en/vu/JVNVU99784493/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tp-link.com/jp/support/download/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.tp-link.com/jp/support/download/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://jvn.jp/en/vu/JVNVU99784493/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:12:25.043Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.8, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38471\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-05T13:55:09.966792Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:tp-link:archer_ax3000_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"tp-link\", \"product\": \"archer_ax3000_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v1_1.1.3_build_20240415\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"tp-link\", \"product\": \"archer_axe75_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v1_1.2.0_build_20240320\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:tp-link:archer_ax5400_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"tp-link\", \"product\": \"archer_ax5400_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v1_1.1.4_build_20240429\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:tp-link:archer_axe5400_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"tp-link\", \"product\": \"archer_axe5400_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v1_1.0.3_build_20240319\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:tp-link:archer_airr5_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"tp-link\", \"product\": \"archer_airr5_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"v1_1.0.3_build_20240319\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-05T14:16:15.882Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"TP-LINK\", \"product\": \"Archer AX3000\", \"versions\": [{\"status\": \"affected\", \"version\": \"firmware versions prior to \\\"Archer AX3000(JP)_V1_1.1.3 Build 20240415\\\"\"}]}, {\"vendor\": \"TP-LINK\", \"product\": \"Archer AXE75\", \"versions\": [{\"status\": \"affected\", \"version\": \"firmware versions prior to \\\"Archer AXE75(JP)_V1_1.2.0 Build 20240320\\\"\"}]}, {\"vendor\": \"TP-LINK\", \"product\": \"Archer AX5400\", \"versions\": [{\"status\": \"affected\", \"version\": \"firmware versions prior to \\\"Archer AX5400(JP)_V1_1.1.4 Build 20240429\\\"\"}]}, {\"vendor\": \"TP-LINK\", \"product\": \"Archer Air R5\", \"versions\": [{\"status\": \"affected\", \"version\": \"firmware versions prior to \\\"Archer Air R5(JP)_V1_1.1.6 Build 20240508\\\"\"}]}, {\"vendor\": \"TP-LINK\", \"product\": \"Archer AXE5400\", \"versions\": [{\"status\": \"affected\", \"version\": \"firmware versions prior to \\\"Archer AXE5400(JP)_V1_1.0.3 Build 20240319\\\"\"}]}], \"references\": [{\"url\": \"https://www.tp-link.com/jp/support/download/\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware\"}, {\"url\": \"https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware\"}, {\"url\": \"https://jvn.jp/en/vu/JVNVU99784493/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"OS command injection\"}]}], \"providerMetadata\": {\"orgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"shortName\": \"jpcert\", \"dateUpdated\": \"2024-07-04T00:49:13.216Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-38471\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-13T13:17:03.724Z\", \"dateReserved\": \"2024-06-17T00:49:41.427Z\", \"assignerOrgId\": \"ede6fdc4-6654-4307-a26d-3331c018e2ce\", \"datePublished\": \"2024-07-04T00:49:13.216Z\", \"assignerShortName\": \"jpcert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…