{"api_version":"1","generated_at":"2026-04-23T04:42:14+00:00","cve":"CVE-2021-42232","urls":{"html":"https://cve.report/CVE-2021-42232","api":"https://cve.report/api/cve/CVE-2021-42232.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-42232","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-42232"},"summary":{"title":"CVE-2021-42232","description":"TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-08-23 01:15:00","updated_at":"2023-11-07 03:39:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"http://archer.com","name":"http://archer.com","refsource":"MISC","tags":[],"title":"Archer","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7(US)_V5_20519_tddp.md","name":"https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7(US)_V5_20519_tddp.md","refsource":"MISC","tags":[],"title":"IoT/Archer A7(US)_V5_20519_tddp.md at main · mQaLeX/IoT · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://tp-link.com","name":"http://tp-link.com","refsource":"MISC","tags":[],"title":"TP-Link Canada - WiFi Networking Equipment for Home & Business","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7%28US%29_V5_20519_tddp.md","name":"https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7%28US%29_V5_20519_tddp.md","refsource":"","tags":[],"title":"IoT/Archer A7(US)_V5_20519_tddp.md at main · mQaLeX/IoT · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-42232","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-42232","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"42232","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"tp-link","cpe5":"archer_a7","cpe6":"v5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"42232","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"tp-link","cpe5":"archer_a7_firmware","cpe6":"210519","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2021-42232","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"TP-Link Archer A7 Archer A7(US)_V5_210519 is affected by a command injection vulnerability in /usr/bin/tddp. The vulnerability is caused by the program taking part of the received data packet as part of the command. This will cause an attacker to execute arbitrary commands on the router."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"http://tp-link.com","refsource":"MISC","name":"http://tp-link.com"},{"url":"http://archer.com","refsource":"MISC","name":"http://archer.com"},{"refsource":"MISC","name":"https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7(US)_V5_20519_tddp.md","url":"https://github.com/mQaLeX/IoT/blob/main/tp-link/Archer%20A7(US)_V5_20519_tddp.md"}]}},"nvd":{"publishedDate":"2022-08-23 01:15:00","lastModifiedDate":"2023-11-07 03:39:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:tp-link:archer_a7_firmware:210519:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:h:tp-link:archer_a7:v5:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"42232","Ordinal":"218091","Title":"CVE-2021-42232","CVE":"CVE-2021-42232","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"42232","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}