Statement on Remote Command Execution on Archer C5400X(CVE-2024-5035)

Security Advisory
Updated 05-31-2024 00:49:01 AM FAQ view icon18542
This Article Applies to: 

TP-Link has received a report from Onekey related to the Archer C5400X and a potential Remote Command Execution vulnerability.  We have been actively working with Onekey to investigate and address this reported concern.  At this time, we are happy to announce a firmware, Archer C5400X_V1_1.1.7 Build 20240510, has been added to the TP-Link Official website.  It has also been pushed as an OTA (over-the-air) update. Users can either update the firmware directly in the Tether app or download it from the official TP-Link website.

TP-Link takes all security concerns very seriously and takes active measures to resolve them once they have been identified.  Identification and resolutions can even be completed before a public announcement from a security firm or news agency is made.

For this reported concern, TP-Link strongly recommends downloading and installing the latest firmware as soon as possible. 

Disclaimer:

If you do not take all of the recommended actions, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Recommend Products

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >