Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x34h-6cf7-qmw4

Опубликовано: 18 окт. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.9

Описание

The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.

The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.

EPSS

Процентиль: 88%
0.04154
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 5.9
nvd
больше 3 лет назад

The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information.

CVSS3: 5.9
fstec
больше 3 лет назад

Уязвимость компонента Client микропрограммного обеспечения маршрутизаторов TP-Link Archer AX10, позволяющая нарушителю реализовать атаку методом «грубой силы» (brute force) и получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 88%
0.04154
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-798