Vulnerability Update: Addressing Archer C6/A6 V3 Performance Issues of Abnormal Upload Traffic
We've recently heard from our Archer C6/A6 V3 users about unexpected latency and upload traffic issues. Our investigation revealed that these devices were compromised through an unauthenticated command injection vulnerability (CVE-2023-1389).
To rectify this, we've released firmware 1.0.16 Build 20230828 to fix the vulnerability:
For Archer C6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer C6_V3_230828.zip
For Archer A6 V3: https://static.tp-link.com/upload/firmware/2023/202308/20230828/Archer A6_V3_230828.zip
We urge all Archer C6/A6 V3 users to upgrade immediately if your device is compromised or you are concerned that your device may be affected. If issues persist or similar issues exist after upgrading to the latest firmware, please contact TP-Link for help.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.