8.8
CVSSv3

CVE-2022-30075

Published: 09/06/2022 Updated: 30/09/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link archer_ax50_firmware

Exploits

TP-Link AX50 router with firmware 210730 suffers from an authenticated remote code execution vulnerability ...

Github Repositories

TP-Link-Archer-AX10-V1 A proof of concept for TP-LINK router Archer AX10 v1 - CVE-2022-40486 Intro The device I conducted this research on was the Archer AX10 v1 home WiFi router from TP-Link (Firmware Version 131 Build 20220401 Rel 57450(5553)) My first approach was to get access via the UART Interface on the board You can see about "How to Detect Serial Pinout (GND

Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)

CVE-2022-30075 Authenticated Remote Code Execution in Tp-Link Routers Affected Devices If your Tp-Link router has backup and restore functionality and firmware is older than june 2022, it is probably vulnerable Tested With Tp-Link Archer AX50, other tplink routers may use different format of backups and exploit needs to be modified PoC Using exploit for starting telnet daemon o

A curated list of my GitHub stars!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents Adblock Filter List Assembly Awk Batchfile Brainfuck C C# C++ CMake CSS Clojure Common Lisp Crystal Cython Dart Dhall Dockerfile Earthly Elixir Emacs Lisp Erlang Fennel GDScript Go HTML Handlebars Haskell Inno Setup Java JavaScript Jupyter Notebook Kotlin LLVM Lua M4 MDX Makefile NCL Nim Nix Nun