Vulnerability Description
Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505' and Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506' use hard-coded credentials to login to the affected device, which may allow a network-adjacent unauthenticated attacker to execute an arbitrary OS command.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Archer C55 Firmware | < 230506 |
| Tp-Link | Archer C55 | - |
| Tp-Link | Archer C50 V3 Firmware | < 230505 |
| Tp-Link | Archer C50 V3 | - |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/vu/JVNVU99392903/Third Party Advisory
- https://www.tp-link.com/jp/support/download/archer-c50/v3/#FirmwareProduct
- https://www.tp-link.com/jp/support/download/archer-c55/#FirmwareProduct
- https://jvn.jp/en/vu/JVNVU99392903/Third Party Advisory
- https://www.tp-link.com/jp/support/download/archer-c50/v3/#FirmwareProduct
- https://www.tp-link.com/jp/support/download/archer-c55/#FirmwareProduct
FAQ
What is CVE-2023-32619?
CVE-2023-32619 is a vulnerability with a CVSS score of 8.8 (HIGH). Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505' and Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506' use hard-coded credentials to login to the affected device, which ...
How severe is CVE-2023-32619?
CVE-2023-32619 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-32619?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Archer C55 Firmware, Tp-Link Archer C55, Tp-Link Archer C50 V3 Firmware, Tp-Link Archer C50 V3.