Cyber Posture

CVE-2024-57049

CriticalPublic PoC

Published: 18 February 2025

Published
18 February 2025
Modified
12 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.3460 97.0th percentile
Risk Priority 40 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57049 is a critical-severity Improper Authentication (CWE-287) vulnerability in Tp-Link Archer C20 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to CGI interfaces, directly preventing authentication bypass via manipulated Referer headers.

prevent

Validates and sanitizes HTTP request inputs including Referer headers to block their exploitation for unauthorized access.

prevent

Limits and documents permitted actions without authentication, mitigating risks from interfaces vulnerable to improper auth checks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables authentication bypass on the TP-Link Archer C20 router's public-facing web (/cgi) interfaces via Referer header manipulation, facilitating exploitation of a public-facing application for initial access.

NVD Description

A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized…

more

as passing the authentication. NOTE: this is disputed by the Supplier because the response to the API call is only "non-sensitive UI initialization variables."

Deeper analysisAI

CVE-2024-57049 is an authentication bypass vulnerability (CWE-287) affecting the TP-Link Archer C20 router with firmware version V6.6_230412 and earlier. The issue resides in certain interfaces under the /cgi directory, where adding a Referer header set to http://tplinkwifi.net in requests tricks the router into treating the request as authenticated.

Any unauthenticated attacker with network access to the router can exploit this vulnerability with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Exploitation grants access to the affected interfaces, potentially enabling high-impact compromise of confidentiality, integrity, and availability.

The vulnerability is documented in a GitHub repository detailing the ACL bypass, but the supplier disputes its severity, stating that API responses contain only non-sensitive UI initialization variables. No patches or specific mitigations are mentioned in available advisories.

Details

CWE(s)

Affected Products

tp-link
archer c20 firmware
6.6_230412

CVEs Like This One

CVE-2026-0834Same product: Tp-Link Archer C20
CVE-2026-34121Same vendor: Tp-Link
CVE-2025-25897Same vendor: Tp-Link
CVE-2025-15517Same vendor: Tp-Link
CVE-2026-1668Same vendor: Tp-Link
CVE-2025-9292Same vendor: Tp-Link
CVE-2025-52395Shared CWE-287
CVE-2025-15484Shared CWE-287
CVE-2025-71279Shared CWE-287
CVE-2024-13804Shared CWE-287

References