

Gamaredon Uses DNS Fast-Flux and Cloudflare Tunnels to Conceal GammaDrop Malware – Active IOCs
December 6, 2024
Mirai Botnet aka Katana – Active IOCs
December 7, 2024
Gamaredon Uses DNS Fast-Flux and Cloudflare Tunnels to Conceal GammaDrop Malware – Active IOCs
December 6, 2024
Mirai Botnet aka Katana – Active IOCs
December 7, 2024Severity
Medium
Analysis Summary
CVE-2024-54127 CVSS:4.3
This vulnerability exists in the TP-Link Archer C50 due to presence of terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the UART shell on the vulnerable device. Successful exploitation of this vulnerability could allow the attacker to obtain Wi-Fi credentials of the targeted system.
CVE-2024-54126 CVSS:8.5
This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this vulnerability by uploading and executing malicious firmware which could lead to complete compromise of the targeted device.
Impact
- Gain Access
Indicators of Compromise
CVE
- CVE-2024-54127
- CVE-2024-54126
Affected Vendors
Affected Products
- TP-Link Archer C50
Remediation
Refer to TP-Link Security Advisory for patch, upgrade, or suggested workaround information.