NA

CVE-2022-40486

Published: 28/09/2022 Updated: 30/09/2022
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) exists to allow authenticated malicious users to execute arbitrary code via a crafted backup file.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link archer_ax10_v1_firmware 1.3.1

Github Repositories

TP-Link-Archer-AX10-V1 A proof of concept for TP-LINK router Archer AX10 v1 - CVE-2022-40486 Intro The device I conducted this research on was the Archer AX10 v1 home WiFi router from TP-Link (Firmware Version 131 Build 20220401 Rel 57450(5553)) My first approach was to get access via the UART Interface on the board You can see about "How to Detect Serial Pinout (GND