Vulnerability Update: Addressing Archer C6/A6 V3 Performance Issues of Abnormal Upload Traffic

Security Advisory
Дата последнего обновления: 08-30-2023 03:41:21 AM 11984
Эта статья подходит для: 

We've recently heard from our Archer C6/A6 V3 users about unexpected latency and upload traffic issues. Our investigation revealed that these devices were compromised through an unauthenticated command injection vulnerability (CVE-2023-1389).

To rectify this, we've released firmware 1.0.16 Build 20230828 to fix the vulnerability:

For Archer C6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer C6_V3_230828.zip

For Archer A6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer A6_V3_230828.zip

We urge all Archer C6/A6 V3 users to upgrade immediately if your device is compromised or you are concerned that your device may be affected. If issues persist or similar issues exist after upgrading to the latest firmware, please contact TP-Link for help.

Был ли этот FAQ полезен?

Ваш отзыв поможет нам улучшить работу сайта.

Community

Сообщество TP-Link

Нужна помощь? Задавайте вопросы, находите ответы и обращайтесь за помощью к специалистам TP-Link и другим пользователям со всего мира.

Посетить сообщество >

From United States?

Get products, events and services for your region.