CVE-2021-42232
Summary
| CVE | CVE-2021-42232 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-23 01:15:00 UTC |
| Updated | 2023-11-07 03:39:00 UTC |
| Description | TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router. |
Risk And Classification
Problem Types: CWE-78
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Tp-link | Archer A7 | v5 | All | All | All |
| Operating System | Tp-link | Archer A7 Firmware | 210519 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Archer | MISC | archer.com | |
| IoT/Archer A7(US)_V5_20519_tddp.md at main · mQaLeX/IoT · GitHub | MISC | github.com | |
| TP-Link Canada - WiFi Networking Equipment for Home & Business | MISC | tp-link.com | |
| IoT/Archer A7(US)_V5_20519_tddp.md at main · mQaLeX/IoT · GitHub | github.com | ||
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.