ADVISORY!

TLP : CLEAR

Date : 28/05/2024

REF NO : CERT / 2024/05/50

TP-Link Router Remote Code Execution Vulnerabilities

Severity Level: Medium

Components Affected

  • TP-Link Archer C5400X prior to 1_1.1.6

Overview

A vulnerability were identified in TP-Link router. A remote attacker could exploit this vulnerability to trigger remote code execution and elevation of privilege on the targeted system.

Description

The affected device expose a network service called “rftest” that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6.

Impact

  • Remote Code Execution
  • Elevation of Privilege

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC