Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated malicious user to execute an arbitrary OS command via a crafted request to bypass authentication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tp-link archer_c20_firmware |