"value":"Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi."
}
]
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"OS command injection"
}
]
}
]
},
"affects":{
"vendor":{
"vendor_data":[
{
"vendor_name":"TP-LINK",
"product":{
"product_data":[
{
"product_name":"Archer AX3000",
"version":{
"version_data":[
{
"version_affected":"=",
"version_value":"firmware versions prior to \"Archer AX3000(JP)_V1_1.1.3 Build 20240415\""
}
]
}
},
{
"product_name":"Archer AXE75",
"version":{
"version_data":[
{
"version_affected":"=",
"version_value":"firmware versions prior to \"Archer AXE75(JP)_V1_1.2.0 Build 20240320\""
}
]
}
},
{
"product_name":"Archer AX5400",
"version":{
"version_data":[
{
"version_affected":"=",
"version_value":"firmware versions prior to \"Archer AX5400(JP)_V1_1.1.4 Build 20240429\""
}
]
}
},
{
"product_name":"Archer Air R5",
"version":{
"version_data":[
{
"version_affected":"=",
"version_value":"firmware versions prior to \"Archer Air R5(JP)_V1_1.1.6 Build 20240508\""
}
]
}
},
{
"product_name":"Archer AXE5400",
"version":{
"version_data":[
{
"version_affected":"=",
"version_value":"firmware versions prior to \"Archer AXE5400(JP)_V1_1.0.3 Build 20240319\""