{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T23:29:43.583","vulnerabilities":[{"cve":{"id":"CVE-2023-39224","sourceIdentifier":"vultures@jpcert.or.jp","published":"2023-09-06T10:15:14.587","lastModified":"2024-11-21T08:14:56.990","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided."},{"lang":"es","value":"Todas las versiones del firmware Archer C5 y las versiones del firmware Archer C7 anteriores a 'Archer C7(JP)_V2_230602' permiten que un atacante autenticado adyacente a la red ejecute comandos arbitrarios del sistema operativo. Tenga en cuenta que Archer C5 ya no está soportado, por lo tanto, no se proporciona la actualización para este producto.\n"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_c7_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"230602","matchCriteriaId":"8F37BD5C-4B5B-4DB2-81DB-249D53A3CD43"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_c7:2.0:*:*:*:*:*:*:*","matchCriteriaId":"27AE1E18-D939-4DB3-984A-85CB4962861C"}]}]}],"references":[{"url":"https://jvn.jp/en/vu/JVNVU99392903/","source":"vultures@jpcert.or.jp","tags":["Third Party Advisory"]},{"url":"https://www.tp-link.com/jp/support/download/archer-c7/v2/#Firmware","source":"vultures@jpcert.or.jp","tags":["Product"]},{"url":"https://jvn.jp/en/vu/JVNVU99392903/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://www.tp-link.com/jp/support/download/archer-c7/v2/#Firmware","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}