PT-2024-9110 · Tp Link · Tp-Link Tapo Series +2

Thottysploity

·

Published

2024-11-20

·

Updated

2024-12-19

·

CVE-2024-53375

CVSS v3.1
8.0
VectorAV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions: TP-Link Archer series (affected versions not specified) TP-Link Deco Series (affected versions not specified) TP-Link Tapo Series (affected versions not specified)
Description: An Authenticated Remote Code Execution (RCE) vulnerability exists in the
tmp get sites
function of the HomeShield functionality provided by TP-Link. This vulnerability allows a remote attacker to execute arbitrary commands. The issue is still exploitable without the activation of the HomeShield functionality.
Recommendations: As a temporary workaround, consider disabling the
tmp get sites
function until a patch is available. Restrict access to the HomeShield functionality to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

OS Command Injection

Weakness Enumeration

Related Identifiers

BDU:2024-10792
CVE-2024-53375

Affected Products

Tp-Link Archer Series
Tp-Link Deco Series
Tp-Link Tapo Series