cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-31188,https://securityvulnerability.io/vulnerability/CVE-2023-31188,Command Injection Vulnerability in TP-LINK Routers,"A vulnerability exists in multiple TP-LINK Archer routers that allows a network-adjacent authenticated attacker to execute arbitrary OS commands. This issue arises due to improper validation of input, permitting malicious actions through crafted requests. Users of the Archer C50, C55, and C20 routers must promptly update their firmware to ensure protection from potential exploitation. Detailed firmware versions that require updating are listed in the affected products section.",Tp-link,"Archer C50,Archer C55,Archer C20",8,HIGH,0.0005699999746866524,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0 CVE-2023-32619,https://securityvulnerability.io/vulnerability/CVE-2023-32619,Command Injection Vulnerability in TP-Link Archer C50 and C55 Routers,The TP-Link Archer C50 and Archer C55 routers suffer from a command injection vulnerability due to the use of hard-coded credentials. This security flaw allows network-adjacent unauthenticated attackers to execute arbitrary OS commands on the affected devices. Users should update their firmware to the specified versions to mitigate this risk and secure their network devices.,Tp-link,"Archer C50,Archer C55",8.8,HIGH,0.0006799999973736703,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0