This vulnerability exists in the TP-Link Archer C50 due...
High severity
Unreviewed
Published
Dec 5, 2024
to the GitHub Advisory Database
•
Updated Dec 5, 2024
Description
Published by the National Vulnerability Database
Dec 5, 2024
Published to the GitHub Advisory Database
Dec 5, 2024
Last updated
Dec 5, 2024
This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this vulnerability by uploading and executing malicious firmware which could lead to complete compromise of the targeted device.
References