CVE-2024-38471

EUVD-2024-37352
Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 MEDIUM
ADJACENT_NETWORK
LOW
HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 25%
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
tp-linkarcher_ax3000_firmware
𝑥
< v1_1.1.3_build_20240415
ADP
tp-linkarcher_axe75_firmware
𝑥
< v1_1.2.0_build_20240320
ADP
tp-linkarcher_ax5400_firmware
𝑥
< v1_1.1.4_build_20240429
ADP
tp-linkarcher_axe5400_firmware
𝑥
< v1_1.0.3_build_20240319
ADP
tp-linkarcher_airr5_firmware
𝑥
< v1_1.0.3_build_20240319
ADP