CVE-2023-38588

Archer C3150 firmware versions prior to 'Archer C3150(JP)_V2_230511' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_c3150_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_c3150:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:13

Type Values Removed Values Added
References () https://jvn.jp/en/vu/JVNVU99392903/ - Third Party Advisory () https://jvn.jp/en/vu/JVNVU99392903/ - Third Party Advisory
References () https://www.tp-link.com/jp/support/download/archer-c3150/#Firmware - Product () https://www.tp-link.com/jp/support/download/archer-c3150/#Firmware - Product

26 Sep 2024, 19:35

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-06 10:15

Updated : 2024-11-21 08:13


NVD link : CVE-2023-38588

Mitre link : CVE-2023-38588

CVE.ORG link : CVE-2023-38588


JSON object : View

Products Affected

tp-link

  • archer_c3150
  • archer_c3150_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')