CVE-2024-21833
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2024-21833. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1EPSS Score
v2025.03.14There is a 0.2% chance that this vulnerability will be exploited in the wild within the next 30 days.
Attack Vector Metrics
Impact Metrics
Description
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
Available Exploits
Related News
Affected Products
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References
Advisory provided by GitHub Security Advisory Database. Published: January 11, 2024, Modified: July 4, 2024
Social Media Intelligence
Real-time discussions and threat intelligence from social platforms
Best VPNs for TP-Link Routers The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently flagged multiple TP-Link router vulnerabilities as **actively exploited by hackers**, with federal agencies given strict deadlines to remove affected devices from their networks. If you're among the millions using TP-Link routers at home or in your …
Is TP-Link Abandoning the Deco X50-PoE V1? I’m trying to understand TP-Link’s stance on the Deco X50-PoE V1. It’s been left with an unpatched critical vulnerability, CVE-2024-21833, which allows for a complete takeover of the router by anyone on the local network (including guests) without a password. The most frustrating …