Vulnerability Update: Addressing Archer C6/A6 V3 Performance Issues of Abnormal Upload Traffic

Security Advisory
Updated 08-30-2023 03:41:21 AM 3457
This Article Applies to: 

We've recently heard from our Archer C6/A6 V3 users about unexpected latency and upload traffic issues. Our investigation revealed that these devices were compromised through an unauthenticated command injection vulnerability (CVE-2023-1389).

To rectify this, we've released firmware 1.0.16 Build 20230828 to fix the vulnerability:

For Archer C6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer C6_V3_230828.zip

For Archer A6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer A6_V3_230828.zip

We urge all Archer C6/A6 V3 users to upgrade immediately if your device is compromised or you are concerned that your device may be affected. If issues persist or similar issues exist after upgrading to the latest firmware, please contact TP-Link for help.

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >

From United States?

Get products, events and services for your region.