Product:

Archer_c7_firmware

(Tp\-Link)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2023-05-11 CVE-2023-2646 A vulnerability has been found in TP-Link Archer C7v2 v2_en_us_180114 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component GET Request Parameter Handler. The manipulation leads to denial of service. The attack can only be done within the local network. The associated identifier of this vulnerability is VDB-228775. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Archer_c7_firmware 6.5
2020-12-26 CVE-2020-35575 A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices. Archer_c5_firmware, Archer_c7_firmware, Mr3420_firmware, Mr6400_firmware, Wa701nd_firmware, Wa801nd_firmware, Wa901nd_firmware, Wdr3500_firmware, Wdr3600_firmware, We843n_firmware, Wr1043nd_firmware, Wr1045nd_firmware, Wr740n_firmware, Wr741nd_firmware, Wr749n_firmware, Wr802n_firmware, Wr840n_firmware, Wr841hp_firmware, Wr841n_firmware, Wr842n_firmware, Wr842nd_firmware, Wr845n_firmware, Wr940n_firmware, Wr941hp_firmware, Wr945n_firmware, Wr949n_firmware, Wrd4300_firmware 9.8
2023-09-06 CVE-2023-39224 Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided. Archer_c7_firmware 8.0