CVE-2022-41541
8.1HIGHTP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to t
Опубликовано: 10/18/2022Обновлено: 5/15/2025
Описание
TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user.
ИИ-АнализНа базе ИИ
Затронутые продукты
tp-linkax10_firmware
v1_211117
tp-linkax10
1.0
Ссылки
- https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/ReplayExploitThird Party Advisory
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareProductVendor Advisory
- https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/ReplayExploitThird Party Advisory
- https://www.tp-link.com/us/support/download/archer-ax10/v1/#FirmwareProductVendor Advisory