Vulnerabilities
Vulnerable Software
Tp-Link:  >> Archer C20  Security Vulnerabilities
A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication.
CVSS Score
9.8
EPSS Score
0.245
Published
2025-02-18
Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.
CVSS Score
8.8
EPSS Score
0.0
Published
2023-09-06
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
CVSS Score
7.5
EPSS Score
0.003
Published
2023-07-18


Contact Us

Shodan ® - All rights reserved