First published: Wed May 15 2019(Updated: )
TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Archer Cr700 Firmware | =1.0.6 | |
TP-Link Archer CR700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10719 is classified as a medium severity vulnerability due to its potential to allow unauthorized access to sensitive information.
CVE-2016-10719 affects TP-Link Archer CR-700 devices by allowing cross-site scripting (XSS) through a DHCP request, impacting the security of the admin account.
To fix CVE-2016-10719, update your TP-Link Archer CR-700 to the latest firmware version that addresses the XSS vulnerability.
Yes, CVE-2016-10719 can be exploited remotely by an attacker through specific crafted DHCP requests.
CVE-2016-10719 can allow attackers to steal cookie information, potentially leading to unauthorized access to the admin account.