Description
A command injection vulnerability was identified in the web module of Archer AXE75 v1.6/v1.0 router. An authenticated attacker with adjacent-network access may be able to perform remote code execution (RCE) when the router is configured with sysmode=ap. Successful exploitation results in root-level privileges and impacts confidentiality, integrity and availability of the device. This issue affects Archer AXE75 v1.6/v1.0: through 1.3.2 Build 20250107.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Any version
References
www.tp-link.com/us/support/download/archer-axe75/v1.60/
www.tp-link.com/us/support/download/archer-axe75/v1/
www.tp-link.com/en/support/download/archer-axe75/v1/
www.tp-link.com/us/support/faq/5005/