Improper authentication vulnerability in Archer C20 firmware versions prior to Archer C20(JP)_V1_230616 allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Archer_c20_firmware | Tp-link | * | 230616 (excluding) |