SARA / Free Tools / CVE / CVE-2024-21773

CVE-2024-21773 — Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.

CVSS
EPSS
18.00% (top 60.80%)
CWE
Published
2024-01-10T23:24:50.112Z
Last modified
2025-06-03T14:26:17.285Z
CVSS vector

01What is this vulnerability?

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product from the LAN port or Wi-Fi to execute arbitrary OS commands on the product that has pre-specified target devices and blocked URLs in parental control settings.

02Affected products

VendorProductVersions
TP-LinkArcher AX3000firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115"
TP-LinkArcher AX5400firmware versions prior to "Archer AX5400(JP)_V1_1.1.2 Build 20231115"
TP-LinkDeco X50firmware versions prior to "Deco X50(JP)_V1_1.4.1 Build 20231122"
TP-LinkDeco XE200firmware versions prior to "Deco XE200(JP)_V1_1.2.5 Build 20231120"
TP-LinkArcher Air R5firmware versions prior to "Archer Air R5(JP)_V1_1.1.6 Build 20240508"

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →