CVE-2024-38471: Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a...

Description

Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.

Classification

CVE ID: CVE-2024-38471

Problem Types

OS command injection

Affected Products

Vendor: TP-LINK, TP-LINK, TP-LINK, TP-LINK, TP-LINK

Product: Archer AX3000, Archer AXE75, Archer AX5400, Archer Air R5, Archer AXE5400

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.41% (probability of being exploited)

EPSS Percentile: 58.35% (scored less or equal to compared to others)

EPSS Date: 2025-04-11 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-38471
https://www.tp-link.com/jp/support/download/
https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware
https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware
https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware
https://www.tp-link.com/jp/support/download/archer-air-r5/v1/#Firmware
https://www.tp-link.com/jp/support/download/archer-axe5400/#Firmware
https://jvn.jp/en/vu/JVNVU99784493/

Timeline