Archer C20 Firmware Tp Link Archer C20 Firmware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Tp Link Archer C20 Firmware.

By the Year

In 2026 there have been 0 vulnerabilities in Tp Link Archer C20 Firmware. Last year, in 2025 Archer C20 Firmware had 1 security vulnerability published. Right now, Archer C20 Firmware is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 9.80

It may take a day or so for new Archer C20 Firmware vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Tp Link Archer C20 Firmware Security Vulnerabilities

TP-Link Archer C20 Auth Bypass via /cgi (V6.6_230412)
CVE-2024-57049 9.8 - Critical - February 18, 2025

A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication. NOTE: this is disputed by the Supplier because the response to the API call is only "non-sensitive UI initialization variables."

authentification

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Tp Link Archer C20 Firmware or by Tp Link? Click the Watch button to subscribe.

Tp Link
Vendor

subscribe