CVE-2024-48288

TP-Link TL-IPC42C V4.0_20211227_1.0.16 is vulnerable to command injection due to the lack of malicious code verification on both the frontend and backend.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-ipc42c_firmware:20211227_1.0.16:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-ipc42c:4.0:*:*:*:*:*:*:*

History

15 Aug 2025, 20:38

Type Values Removed Values Added
CPE cpe:2.3:o:tp-link:tl-ipc42c_firmware:4.0_20211227_1.0.16:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-ipc42c:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-ipc42c_firmware:20211227_1.0.16:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-ipc42c:4.0:*:*:*:*:*:*:*

24 Jun 2025, 16:04

Type Values Removed Values Added
References () https://github.com/GroundCTL2MajorTom/pocs/blob/main/Cisco_Linksys_E3000_rce.md - () https://github.com/GroundCTL2MajorTom/pocs/blob/main/Cisco_Linksys_E3000_rce.md - Exploit, Third Party Advisory
References () https://github.com/GroundCTL2MajorTom/pocs/blob/main/TP-Link_TL-IPC42C_RCE.md - () https://github.com/GroundCTL2MajorTom/pocs/blob/main/TP-Link_TL-IPC42C_RCE.md - Exploit, Third Party Advisory
First Time Tp-link
Tp-link tl-ipc42c
Tp-link tl-ipc42c Firmware
CPE cpe:2.3:o:tp-link:tl-ipc42c_firmware:4.0_20211227_1.0.16:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-ipc42c:-:*:*:*:*:*:*:*

26 Nov 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-21 18:15

Updated : 2025-08-15 20:38


NVD link : CVE-2024-48288

Mitre link : CVE-2024-48288


JSON object : View

Products Affected

tp-link

  • tl-ipc42c
  • tl-ipc42c_firmware
CWE

No CWE.