漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Authenticated RCE via Parental Control command injection
Vulnerability Description
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es).
CVSS Information
N/A
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Vulnerability Title
TP-LINK多款产品 安全漏洞
Vulnerability Description
TP-LINK TL-WR841ND等都是中国普联(TP-LINK)公司的产品。TP-LINK TL-WR841ND是一款无线路由器。TP-Link Archer C7等都是中国普联(TP-Link)公司的产品。TP-Link Archer C7是一款路由器。TP-Link TL-WR841N是一款路由器。 TP-LINK多款产品存在安全漏洞,该漏洞源于家长控制页面处理不当,可能导致远程命令执行。以下产品及版本受到影响:TP-Link Archer C7(EU) V2 241108之前版本和TL-WR84
CVSS Information
N/A
Vulnerability Type
N/A