You must log in or register to comment.
In addition to the back doors?
Glad I only have two of their “dumb” switches then.
"[It] affects several popular models, including the Archer AX10 and AX1500.
[…] input from external messages is used directly to calculate a buffer length […] without any boundary checks. […] A payload of 4096 bytes […] confirmed that the program counter can be overwritten. This means that complete system compromise with root privileges is achievable."
Sounds very fixable
A new vulnerability in a TP-Link device? Oh no, it must be a day ending in Y
Proprietary software
This happens every week, it seems.