Statement on Remote Command Execution on Archer C5400X(CVE-2024-5035)
TP-Link has received a report from Onekey related to the Archer C5400X and a potential Remote Command Execution vulnerability. We have been actively working with Onekey to investigate and address this reported concern. At this time, we are happy to announce a firmware, Archer C5400X_V1_1.1.7 Build 20240510, has been added to the TP-Link Official website. It has also been pushed as an OTA (over-the-air) update. Users can either update the firmware directly in the Tether app or download it from the official TP-Link website.
TP-Link takes all security concerns very seriously and takes active measures to resolve them once they have been identified. Identification and resolutions can even be completed before a public announcement from a security firm or news agency is made.
For this reported concern, TP-Link strongly recommends downloading and installing the latest firmware as soon as possible.
Disclaimer:
If you do not take all of the recommended actions, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.