cve/2024/CVE-2024-57049.md
2025-09-29 21:09:30 +02:00

18 lines
895 B
Markdown

### [CVE-2024-57049](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57049)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication.
### POC
#### Reference
- https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/archer%20c20/ACL%20bypass%20Vulnerability%20in%20TP-Link%20archer%20c20.md
#### Github
- https://github.com/ARPSyndicate/cve-scores