CVE-2023-31756
MEDIUMTp-link Archer Vr1600v Firmware - OS Command Injection
Title source: ruleDescription
A command injection vulnerability exists in the administrative web portal in TP-Link Archer VR1600V devices running firmware Versions <= 0.1.0. 0.9.1 v5006.0 Build 220518 Rel.32480n which allows remote attackers, authenticated to the administrative web portal as an administrator user to open an operating system level shell via the 'X_TP_IfName' parameter.
Exploits (1)
References (1)
Core 1
Core References
Exploit, Technical Description, Third Party Advisory
https://stanleyjobsonau.github.io/tp-link-advisory.html
Scores
CVSS v3
6.7
EPSS
0.0329
EPSS Percentile
87.3%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-78
Status
published
Products (1)
tp-link/archer_vr1600v_firmware
< 0.1.0_0.9.1_v5006.0_build_200810_rel.53181n
Published
May 19, 2023
Tracked Since
Feb 18, 2026