First published: Sat Feb 13 2021(Updated: )
In the management interface on TP-Link Archer C5v 1.7_181221 devices, credentials are sent in a base64 format over cleartext HTTP.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer C5v AC1200 | =1.7_181221 | |
TP-Link Archer C5v AC1200 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27209 has a medium severity rating due to the risk of credential exposure.
CVE-2021-27209 specifically affects TP-Link Archer C5v devices running firmware version 1.7_181221.
To fix CVE-2021-27209, upgrade your TP-Link Archer C5v device to a firmware version that is not vulnerable.
CVE-2021-27209 allows attackers to intercept base64 encoded credentials sent over unencrypted HTTP.
A temporary workaround for CVE-2021-27209 includes using HTTPS for accessing the management interface if available.