The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46302 | The affected device expose a network service called "rftest" that is vulnerable to unauthenticated command injection on ports TCP/8888, TCP/8889, and TCP/8890. By successfully exploiting this flaw, remote unauthenticated attacker can gain arbitrary command execution on the device with elevated privileges.This issue affects Archer C4500X: through 1_1.1.6. |
Fixes
Solution
Upgrade to firmware version 1_1.1.7.
Workaround
Limit exposure of ports TCP/8888, TCP/8889, and TCP/9000 works as an interim fix.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ONEKEY
Published:
Updated: 2024-08-01T21:03:10.451Z
Reserved: 2024-05-16T21:01:26.696Z
Link: CVE-2024-5035
Updated: 2024-08-01T21:03:10.451Z
Status : Awaiting Analysis
Published: 2024-05-27T08:15:09.490
Modified: 2024-11-21T09:46:49.497
Link: CVE-2024-5035
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD