cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-31188,https://securityvulnerability.io/vulnerability/CVE-2023-31188,Command Injection Vulnerability in TP-LINK Routers,"A vulnerability exists in multiple TP-LINK Archer routers that allows a network-adjacent authenticated attacker to execute arbitrary OS commands. This issue arises due to improper validation of input, permitting malicious actions through crafted requests. Users of the Archer C50, C55, and C20 routers must promptly update their firmware to ensure protection from potential exploitation. Detailed firmware versions that require updating are listed in the affected products section.",Tp-link,"Archer C50,Archer C55,Archer C20",8,HIGH,0.0005699999746866524,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0 CVE-2023-37284,https://securityvulnerability.io/vulnerability/CVE-2023-37284,Improper Authentication in Archer C20 Firmware by TP-Link,"The Archer C20 firmware is susceptible to an improper authentication vulnerability, enabling unauthenticated attackers on the same network to execute arbitrary OS commands. This can occur through carefully crafted requests that bypass the authentication mechanism, posing a serious risk to the confidentiality and integrity of the affected devices.",Tp-link,Archer C20,8.8,HIGH,0.0007099999929778278,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0