Statement on Archer AX21 Remote Code Execution Vulnerability(CVE-2023-1389)

Security Advisory
Дата последнего обновления: 04-27-2023 03:50:33 AM 23231
Эта статья подходит для: 

TP-Link is aware of reports that the REC vulnerability CVE-2023-1389 in AX21 has been added to the Mirai botnet Arsenal.

TP-Link takes security vulnerabilities very seriously and actively deals with them upon receipt of notification. We have released firmware on the official website and pushed the firmware to customers' devices. Click to get Archer AX21's firmware of corresponding hardware version: V1.2, V2, V3.

Archer AX21 will automatically receive update notifications in the web administration interface and Tether application. TP-Link strongly recommends that you download and update to the latest firmware for this product model as soon as possible.

Disclaimer

The vulnerability will remain if you do not take all recommended actions. TP-Link cannot bear any responsibility for consequences that could have been avoided by following the recommendations in this statement.

Был ли этот FAQ полезен?

Ваш отзыв поможет нам улучшить работу сайта.

Community

Сообщество TP-Link

Нужна помощь? Задавайте вопросы, находите ответы и обращайтесь за помощью к специалистам TP-Link и другим пользователям со всего мира.

Посетить сообщество >

From United States?

Get products, events and services for your region.