TP-Link - CVE-2024-5035
Last updated
Was this helpful?
Last updated
Was this helpful?
While the network service is designed to only accept commands that start with "" or "," ONEKEY found that the restriction could be trivially bypassed by injecting a command after shell meta-characters like ; , & , or, | (e.g., "wl;id;").
I have tried to emulate similar TP-Link devices, such as Archer C5400, but have not been able to reproduce the exploit. does not support emulation of Archer C5400X.