CVE-2023-40357
https://notcve.org/view.php?id=CVE-2023-40357
Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'. Múltiples productos TP-LINK permiten que un atacante autenticado adyacente a la red ejecute comandos arbitrarios del sistema operativo. Los productos/versiones afectados son los siguientes: Versiones de firmware de Archer AX50 anteriores a 'Archer AX50(JP)_V1_230529', Versiones de firmware de Archer A10 anteriores a 'Archer A10(JP)_V2_230504', Versiones de firmware de Archer AX10 anteriores a 'Archer AX10(JP) _V1.2_230508' y versiones de firmware de Archer AX11000 anteriores a 'Archer AX11000(JP)_V1_230523'. • https://jvn.jp/en/vu/JVNVU99392903 https://www.tp-link.com/jp/support/download/archer-a10/#Firmware https://www.tp-link.com/jp/support/download/archer-ax10/#Firmware https://www.tp-link.com/jp/support/download/archer-ax11000/#Firmware https://www.tp-link.com/jp/support/download/archer-ax50/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-34832
https://notcve.org/view.php?id=CVE-2023-34832
TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4. • http://archer.com http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html http://tp-link.com https://gist.github.com/jhacker91/2026e080a42514255e758d64b465d1d5 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2022-41541
https://notcve.org/view.php?id=CVE-2022-41541
TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user. TP-Link AX10v1 versión V1_211117, permite a atacantes ejecutar un ataque de repetición al usar un mensaje de autenticación encriptado previamente transmitido y un token de autenticación válido. Los atacantes son capaces de iniciar sesión en la aplicación web como un usuario administrador • https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware • CWE-294: Authentication Bypass by Capture-replay •
CVE-2022-41540
https://notcve.org/view.php?id=CVE-2022-41540
The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information. El cliente de la aplicación web de TP-Link AX10v1 versión V1_211117, usa claves criptográficas embebidas cuando es comunicado con el router. Los atacantes que son capaces de interceptar las comunicaciones entre el cliente web y el router mediante de un ataque de tipo man-in-the-middle pueden entonces obtener la clave de secuencia por medio de un ataque de fuerza bruta, y acceder a información confidencial • https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Offline-decryption https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware • CWE-798: Use of Hard-coded Credentials •
CVE-2022-40486
https://notcve.org/view.php?id=CVE-2022-40486
TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file. Se ha detectado que el firmware de TP Link Archer AX10 versión V1, versión 1.3.1 Build 20220401 Rel. 57450(5553), permitía a atacantes autenticados ejecutar código arbitrario por medio de un archivo de copia de seguridad diseñado • https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md https://www.tp-link.com/br/home-networking/wifi-router/archer-ax10 https://www.tp-link.com/br/support/download/archer-ax10/v1 • CWE-94: Improper Control of Generation of Code ('Code Injection') •