CVE-2020-5797
Published on: 11/21/2020 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:24:03 PM UTC
Certain versions of Archer C9 from Tp-link contain the following vulnerability:
UNIX Symbolic Link (Symlink) Following in TP-Link Archer C9(US)_V1_180125 firmware allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.
- CVE-2020-5797 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
CVSS3 Score: 6.1 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
PHYSICAL | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | NONE |
CVSS2 Score: 3.6 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
TP-Link Archer A7 v5 Router USB Symlink Following Vulnerability - Research Advisory | Tenable® | Exploit Third Party Advisory www.tenable.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Hardware
| Tp-link | Archer C9 | v1 | All | All | All |
Hardware
| Tp-link | Archer C9 | v1 | All | All | All |
Operating System | Tp-link | Archer C9 Firmware | 180125 | All | All | All |
Operating System | Tp-link | Archer C9 Firmware | 180125 | All | All | All |
- cpe:2.3:h:tp-link:archer_c9:v1:*:*:*:*:*:*:*:
- cpe:2.3:h:tp-link:archer_c9:v1:*:*:*:*:*:*:*:
- cpe:2.3:o:tp-link:archer_c9_firmware:180125:*:*:*:*:*:*:*:
- cpe:2.3:o:tp-link:archer_c9_firmware:180125:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE