'; } else{ echo ''; } echo '
|
|
|||
| Rule General Information |
|---|
| Release Date: | 2025-08-05 | |
| Rule Name: | TP-LINK Router API diagnostic Remote Command Execution Vulnerability | |
| Severity: | ||
| CVE ID: | ||
| Rule Protection Details |
|---|
| Description: | TP-LINK (PLink Technology Co., LTD.) is a leading provider of ICT equipment and solutions. Since its establishment in 1996, the vast number of devices it has provided have served thousands of industries and households, aiming to build a world of ubiquitous interconnection. The diagnostic interface of the TP-LINK router has a vulnerability in remote command execution. Attackers can construct special messages to exploit the vulnerability and execute arbitrary commands on the server. | |
| Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
| Affected OS: | Windows, Linux, Others | |
| Reference: | ||
| Solutions |
|---|
| Please contact the software vendor to update the software patch. |