cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-38568,https://securityvulnerability.io/vulnerability/CVE-2023-38568,OS Command Injection Vulnerability in TP-Link Archer A10 Firmware,"The Archer A10 firmware has a significant vulnerability that permits a network-adjacent unauthenticated attacker to execute arbitrary OS commands. This flaw, found in versions prior to 'Archer A10(JP)_V2_230504', could lead to unauthorized access and control over affected devices, presenting a serious security risk to users. It is crucial for users to update their firmware promptly to mitigate this exploit and ensure their network remains secure.",Tp-link,Archer A10,8.8,HIGH,0.0010100000072270632,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0 CVE-2023-40357,https://securityvulnerability.io/vulnerability/CVE-2023-40357,OS Command Execution Vulnerability in TP-LINK Archer Products,"Multiple TP-LINK Archer routers have a vulnerability that allows network-adjacent authenticated attackers to execute arbitrary OS commands. This affects various firmware versions across the Archer AX50, A10, AX10, and AX11000 models, highlighting the importance of keeping devices updated to mitigate potential security threats.",Tp-link,"Archer Ax50,Archer A10,Archer Ax10,Archer Ax11000",8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0