CVE-2022-41541
8.1HIGHTP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to t
Veröffentlicht: 10/18/2022Aktualisiert: 5/15/2025
Beschreibung
TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user.
KI-AnalyseKI-gestützt
Betroffene Produkte
tp-linkax10_firmware
v1_211117
tp-linkax10
1.0
Referenzen
- https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/ReplayExploitThird Party Advisory
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareProductVendor Advisory
- https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/ReplayExploitThird Party Advisory
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareProductVendor Advisory