HomeTp-LinkCVE-2024-57049

CVE-2024-57049

CRITICAL
9.8CVSS
Published: 2025-02-18
Updated: 2026-02-12
AI Analysis

Description

A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication. NOTE: this is disputed by the Supplier because the response to the API call is only "non-sensitive UI initialization variables."

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-287

Metadata

Primary Vendor
TP-LINK
Published
2/18/2025
Last Modified
2/12/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

tp-link : archer_c20_firmware

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2024-57049 | CRITICAL Severity | CVEDatabase.com | CVEDatabase.com