Lucene search

K
Tp-linkArcher C5 Firmware

4 matches found

CVE
CVE
added 2020/12/26 2:15 a.m.170 views

CVE-2020-35575

A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1...

9.8CVSS9.3AI score0.35567EPSS
CVE
CVE
added 2023/01/11 9:15 p.m.84 views

CVE-2022-4498

In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.

9.8CVSS9.7AI score0.00167EPSS
CVE
CVE
added 2023/01/11 7:15 p.m.55 views

CVE-2022-4499

TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.

7.5CVSS7.5AI score0.00068EPSS
CVE
CVE
added 2018/11/26 3:29 a.m.32 views

CVE-2018-19537

TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin ...

9CVSS7.3AI score0.18325EPSS