First published: Sat Feb 13 2021(Updated: )
TP-Link Archer C5v 1.7_181221 devices allows remote attackers to retrieve cleartext credentials via [USER_CFG#0,0,0,0,0,0#0,0,0,0,0,0]0,0 to the /cgi?1&5 URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Archer C5v AC1200 | =1.7_181221 | |
TP-Link Archer C5v AC1200 | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27210 is rated as a high severity vulnerability due to the potential exposure of cleartext credentials to remote attackers.
To fix CVE-2021-27210, you should update the firmware of your TP-Link Archer C5v to the latest version provided by the manufacturer.
CVE-2021-27210 affects TP-Link Archer C5v devices running firmware version 1.7_181221.
Yes, CVE-2021-27210 can be exploited remotely, allowing attackers to retrieve cleartext credentials via a specific URI.
The implications of CVE-2021-27210 include unauthorized access to network configurations and potential compromise of the network security.