Vulnerability Description
Archer AX6000 firmware versions prior to 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Archer Ax6000 Firmware | < 1.3.0 |
| Tp-Link | Archer Ax6000 | 1.0 |
Related Weaknesses (CWE)
References
- https://jvn.jp/en/vu/JVNVU99392903/Third Party Advisory
- https://www.tp-link.com/jp/support/download/archer-ax6000/v1/#FirmwareProduct
- https://jvn.jp/en/vu/JVNVU99392903/Third Party Advisory
- https://www.tp-link.com/jp/support/download/archer-ax6000/v1/#FirmwareProduct
FAQ
What is CVE-2023-40531?
CVE-2023-40531 is a vulnerability with a CVSS score of 8.0 (HIGH). Archer AX6000 firmware versions prior to 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.
How severe is CVE-2023-40531?
CVE-2023-40531 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-40531?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Archer Ax6000 Firmware, Tp-Link Archer Ax6000.