CVE-2021-44827
HIGHTp-link Archer C20i Firmware < 170221 - OS Command Injection
Title source: ruleDescription
There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges.
Exploits (1)
nomisec
WORKING POC
4 stars
by full-disclosure · poc
https://github.com/full-disclosure/CVE-2021-44827
References (3)
Core 3
Core References
Vendor Advisory x_refsource_misc
https://www.tp-link.com/us/security
Exploit, Third Party Advisory x_refsource_misc
https://Full-Disclosure.eu
Exploit, Third Party Advisory x_refsource_misc
https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html
Scores
CVSS v3
8.8
EPSS
0.4463
EPSS Percentile
97.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
tp-link/archer_c20i_firmware
< 170221
Published
Mar 04, 2022
Tracked Since
Feb 18, 2026