Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
https://www.tp-link.com/jp/support/download/deco-xe200/#Firmware
https://www.tp-link.com/jp/support/download/deco-x50/v1/#Firmware
https://www.tp-link.com/jp/support/download/archer-axe75/#Firmware
https://www.tp-link.com/jp/support/download/archer-ax5400/#Firmware
https://www.tp-link.com/jp/support/download/archer-ax3000/#Firmware