Vulnerability Description
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Archer C5 Firmware | <= 2_160201_us |
| Tp-Link | Archer C5 | - |
Related Weaknesses (CWE)
References
- https://github.com/JackDoan/TP-Link-ArcherC5-RCEExploitThird Party Advisory
- https://github.com/JackDoan/TP-Link-ArcherC5-RCEExploitThird Party Advisory
FAQ
What is CVE-2018-19537?
CVE-2018-19537 is a vulnerability with a CVSS score of 7.2 (HIGH). TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF ...
How severe is CVE-2018-19537?
CVE-2018-19537 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-19537?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Archer C5 Firmware, Tp-Link Archer C5.