Vulnerability Update: Addressing Archer C6/A6 V3 Performance Issues of Abnormal Upload Traffic
We've recently heard from our Archer C6/A6 V3 users about unexpected latency and upload traffic issues. Our investigation revealed that these devices were compromised through an unauthenticated command injection vulnerability (CVE-2023-1389).
To rectify this, we've released firmware 1.0.16 Build 20230828 to fix the vulnerability:
For Archer C6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer C6_V3_230828.zip
For Archer A6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer A6_V3_230828.zip
We urge all Archer C6/A6 V3 users to upgrade immediately if your device is compromised or you are concerned that your device may be affected. If issues persist or similar issues exist after upgrading to the latest firmware, please contact TP-Link for help.
Был ли этот FAQ полезен?
Ваш отзыв поможет нам улучшить работу сайта.
Сообщество TP-Link
Нужна помощь? Задавайте вопросы, находите ответы и обращайтесь за помощью к специалистам TP-Link и другим пользователям со всего мира.