{"vulnerability": "cve-2020-5795", "sightings": [{"uuid": "6e1b4b1a-e44c-4683-9597-1392c5715d1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5795", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2078", "content": "#exploit\nCVE-2020-5795:\nTP-Link Archer A7 AC1750 v5 USB Drive Symbolic Link Following Vulnerability\nhttps://www.tenable.com/security/research/tra-2020-60", "creation_timestamp": "2022-07-06T05:33:10.000000Z"}, {"uuid": "c453b245-011d-4145-bd1a-3509f9eba3e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5795", "type": "seen", "source": "https://t.me/cibsecurity/15982", "content": "\u203c CVE-2020-5795 \u203c\n\nUNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-06T18:51:03.000000Z"}]}